Results 31 to 40 of about 36,975 (185)

Applications of Post-Quantum Cryptography

open access: yesEuropean Conference on Cyber Warfare and Security
With the constantly advancing capabilities of quantum computers, conventional cryptographic systems relying on complex math problems may encounter unforeseen vulnerabilities. Unlike regular computers, which are often deemed cost-ineffective in cryptographic attacks, quantum computers have a significant advantage in calculation speed.
Emils Bagirovs   +3 more
openaire   +2 more sources

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Integrating Post-Quantum Cryptography and Blockchain to Secure Low-Cost IoT Devices

open access: yesIEEE Transactions on Industrial Informatics
In the contemporary era, the global proliferation of Internet of Things (IoT) devices exceeds 15 billion, serving functions from wearables to smart grid monitoring.
Aniello Castiglione   +5 more
semanticscholar   +1 more source

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

open access: yesApplied Sciences
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim   +4 more
doaj   +1 more source

Device-independent quantum key distribution from computational assumptions

open access: yesNew Journal of Physics, 2021
In device-independent quantum key distribution (DIQKD), an adversary prepares a device consisting of two components, distributed to Alice and Bob, who use the device to generate a secure key.
Tony Metger   +3 more
doaj   +1 more source

Complying with the NIST post-quantum cryptography standards and decentralizing artificial intelligence: methodology for quantum-resistant and privacy-preserving digital identity systems

open access: yesFrontiers in Blockchain
IntroductionDigital identity infrastructures used in electronic passports, national eID schemes, and federated authentication systems rely predominantly on centralised registries and classical public key cryptography.
Petar Radanliev   +4 more
doaj   +1 more source

THE STATE OF STANDARDIZATION OF POST-QUANTUM CRYPTO-ALGORITHMS AT THE GLOBAL LEVEL

open access: yesАвтоматизация технологических и бизнес-процессов, 2023
. In the digital age, cryptography is widely used in various important systems such as financial, military and government ones, medical records etc. The life of modern people is closely connected with the cryptography.
Oleksandra Tsentseria   +3 more
doaj   +1 more source

Fortifying Future IoT Security: A Comprehensive Review on Lightweight Post-Quantum Cryptography

open access: yesEngineering, Technology & Applied Science Research
This paper presents lightweight Post-Quantum Cryptography (PQC), identifying its importance for a shift from traditional cryptographic schemes, vulnerable to quantum threats, to efficient PQC algorithms. Lattice-based cryptography stands out owing to its
Liyth H. Mahdi, Alharith A. Abdullah
semanticscholar   +1 more source

RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography

open access: yesIACR Cryptology ePrint Archive, 2020
Empowering electronic devices to support Post-Quantum Cryptography (PQC) is a challenging task. PQC introduces new mathematical elements and operations which are usually not easy to implement on standard processors.
Tim Fritzmann   +2 more
semanticscholar   +1 more source

ANALYSIS OF THE CHANGE OF THE CONCEPT «FINANCIAL CRYPTOGRAPHY» ON THE BASIS OF 20 YEARS SUBJECTS OF THE INTERNATIONAL CONFERENCE «FINANCIAL CRYPTOGRAPHY AND DATA SECURITY»

open access: yesСтатистика и экономика, 2016
The article discusses the concept of «financial cryptography», which appeared in 1997 in the eponymous conference title and used abroad to date along with concepts of «quantum cryptography», «post-quantumcryptography», «lightweight cryptography» and ...
Alexander A. Varfolomeev
doaj   +1 more source

Home - About - Disclaimer - Privacy