Results 41 to 50 of about 36,975 (185)
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability.
Tiago M. Fernandez-Carames +1 more
doaj +1 more source
A Performance Comparison of Post-Quantum Algorithms in Blockchain
Blockchain and other Distributed Ledger Technologies (DLTs) have triggered widespread research and interest. This is due to its ability to create redundant, transparent, and accountable connections in various application domains while utilizing ...
Bakhtiyor Yokubov, Lu Gan
doaj +1 more source
Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang +3 more
doaj +1 more source
PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge
Blockchain technology has produced effective solutions and provides security by using cryptographic tools for various applications, attracting attention from the academic community.
Bora Bugra Sezer +2 more
doaj +1 more source
A new non-commutative key exchange protocol on combinatorial semigroup
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj +1 more source
Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design [PDF]
The proliferation of mobile networks and their increasing importance to modern life, combined with the emerging threat of quantum computing, present new challenges and opportunities for cyber-security.
Sanzida Hoque +2 more
semanticscholar +1 more source
Implementing Post-quantum Cryptography for Developers
AbstractWidely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization ...
Hekkala Julius +4 more
openaire +7 more sources
DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +1 more source
Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems.
Jongmin Ahn +7 more
doaj +1 more source
Analyzing the research impact in post quantum cryptography through scientometric evaluation
The accelerated pace of development in the Field of Quantum Computing is very alarming for many of the presently used cryptographic algorithms such as RSA and ECC underlying much of security in the modern world.
Basil Hanafi, Mohammad Ali
semanticscholar +1 more source

