Results 11 to 20 of about 25,460 (262)
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability.
Tiago M. Fernandez-Carames +1 more
doaj +3 more sources
A Survey of Post-Quantum Cryptography: Start of a New Race
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information.
Duc-Thuan Dam +4 more
doaj +3 more sources
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be completely broken once large quantum computers exist. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer; post-quantum cryptosystems strive ...
Bernstein, D.J., Lange, T.
exaly +5 more sources
Optimized Implementation and Analysis of CHAM in Quantum Computing
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions.
Yujin Yang +3 more
doaj +1 more source
Cryptographers seek algorithms quantum computers cannot break.
+4 more sources
QKD-Enhanced Cybersecurity Protocols
Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography
Ivan B. Djordjevic
doaj +1 more source
Cryptography is used broadly in the digital age, making our communications secure, ensuring our data is safe, and enabling secure transactions on which we rely daily. Our reality is connected, we send an email without thinking about all the underlying protocols, we buy online, and we check the weather on our fridge. Utilizations are countless and so is
openaire +2 more sources
Post-quantum distributed ledger technology: a systematic survey
Blockchain technology finds widespread application across various fields due to its key features such as immutability, reduced costs, decentralization, and transparency.
Nikhil Kumar Parida +4 more
doaj +1 more source
Lattice‐based cryptosystems in standardisation processes: A survey
The current widely used public‐key cryptosystems are vulnerable to quantum attacks. To prepare for cybersecurity in the quantum era, some projects have been launched to call for post‐quantum alternatives.
Anyu Wang, Dianyan Xiao, Yang Yu
doaj +1 more source
Device-Independent Relativistic Quantum Bit Commitment [PDF]
We examine the possibility of device-independent relativistic quantum bit commitment. We note the potential threat of {\it location attacks}, in which the behaviour of untrusted devices used in relativistic quantum cryptography depends on their space ...
Adlam, Emily, Kent, Adrian
core +3 more sources

