Results 11 to 20 of about 26,053 (287)
A Design of Secure Communication Architecture Applying Quantum Cryptography
Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short ...
Kyu-Seok Shim +2 more
doaj +1 more source
Optimized Implementation and Analysis of CHAM in Quantum Computing
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang +3 more
doaj +1 more source
QKD-Enhanced Cybersecurity Protocols
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography
Ivan B. Djordjevic
doaj +1 more source
Post-quantum distributed ledger technology: a systematic survey
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida +4 more
doaj +1 more source
Lattice‐based cryptosystems in standardisation processes: A survey
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj +1 more source
Gaussian Post-selection for Continuous Variable Quantum Cryptography [PDF]
We extend the security proof for continuous variable quantum key distribution protocols using post selection to account for arbitrary eavesdropping attacks by employing the concept of an equivalent protocol where the post-selection is implemented as a ...
F. Grosshans +5 more
core +2 more sources
Device-Independent Relativistic Quantum Bit Commitment [PDF]
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of {\it location attacks}, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space ...
Adlam, Emily, Kent, Adrian
core +3 more sources
NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC standard.
Gyeongju Song +4 more
doaj +1 more source
Post-selection technique for quantum channels with applications to quantum cryptography [PDF]
We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems.
Christandl, Matthias +2 more
core +2 more sources
Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems [PDF]
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks.
Kumar Bathala Naresh +5 more
doaj +1 more source

