Results 31 to 40 of about 90,413 (378)

Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together

open access: yesFrontiers in Quantum Science and Technology, 2023
Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing.
Aleksey K. Fedorov, Aleksey K. Fedorov
doaj   +3 more sources

Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization [PDF]

open access: greenarXiv.org
Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems ...
Tao Liu   +2 more
openalex   +2 more sources

Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

open access: goldIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan   +4 more
openalex   +2 more sources

Status report on the second round of the NIST post-quantum cryptography standardization process

open access: bronze, 2020
Dustin Moody   +12 more
openalex   +2 more sources

Cryptography: Advances in Secure Communication and Data Protection [PDF]

open access: yesE3S Web of Conferences, 2023
In the innovative work secure communication and data protection are being main field, which are emerged by cryptography as a fundamental pillar. Strong cryptographic methods are now essential given the rising reliance on digital technologies and the ...
Victor Melvin   +4 more
doaj   +1 more source

A Quantum of QUIC: Dissecting Cryptography with Post-Quantum Insights [PDF]

open access: green
QUIC is a new network protocol standardized in 2021. It was designed to replace the TCP/TLS stack and is based on UDP. The most current web standard HTTP/3 is specifically designed to use QUIC as transport protocol. QUIC claims to provide secure and fast
Marcel Kempf   +4 more
openalex   +3 more sources

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

open access: yesCryptography, 2021
Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on ...
Chithralekha Balamurugan   +3 more
doaj   +1 more source

Secure and Efficient Code-Based Cryptography for Multi-Party Computation and Digital Signatures

open access: yesComputer Sciences & Mathematics Forum, 2023
Code-based cryptography is a promising candidate for post-quantum cryptography due to its strong security guarantees and efficient implementations. In this paper, we explore the use of code-based cryptography for multi-party computation and digital ...
Abdellatif Kichna, Abderrazak Farchane
doaj   +1 more source

EasyPQC: Verifying Post-Quantum Cryptography [PDF]

open access: yesProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, 2021
EasyCrypt is a formal verification tool used extensively for formalizing concrete security proofs of cryptographic constructions. However, the EasyCrypt formal logics consider only classical attackers, which means that post-quantum security proofs cannot be formalized and machine-checked with this tool.
Barbosa, Manuel   +8 more
openaire   +3 more sources

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

Home - About - Disclaimer - Privacy