Results 11 to 20 of about 25,460 (262)

Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

open access: yesIEEE Access, 2020
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability.
Tiago M. Fernandez-Carames   +1 more
doaj   +3 more sources

A Survey of Post-Quantum Cryptography: Start of a New Race

open access: yesCryptography, 2023
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam   +4 more
doaj   +3 more sources

Post-Quantum Cryptography

open access: yesNature, 2017
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Bernstein, D.J., Lange, T.
exaly   +5 more sources

Optimized Implementation and Analysis of CHAM in Quantum Computing

open access: yesApplied Sciences, 2023
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang   +3 more
doaj   +1 more source

Post-Quantum Cryptography

open access: yesCommunications of the ACM, 2023
Cryptographers seek algorithms quantum computers cannot break.
  +4 more sources

QKD-Enhanced Cybersecurity Protocols

open access: yesIEEE Photonics Journal, 2021
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography
Ivan B. Djordjevic
doaj   +1 more source

Post-Quantum Cryptography

open access: yesARIS2 - Advanced Research on Information Systems Security, 2022
Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is
openaire   +2 more sources

Post-quantum distributed ledger technology: a systematic survey

open access: yesScientific Reports, 2023
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida   +4 more
doaj   +1 more source

Lattice‐based cryptosystems in standardisation processes: A survey

open access: yesIET Information Security, 2023
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj   +1 more source

Device-Independent Relativistic Quantum Bit Commitment [PDF]

open access: yes, 2015
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of {\it location attacks}, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space ...
Adlam, Emily, Kent, Adrian
core   +3 more sources

Home - About - Disclaimer - Privacy