Results 41 to 50 of about 36,975 (185)

Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks

open access: yesIEEE Access, 2020
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in the last years and their use has been suggested for numerous applications due to their ability to provide transparency, redundancy and accountability.
Tiago M. Fernandez-Carames   +1 more
doaj   +1 more source

A Performance Comparison of Post-Quantum Algorithms in Blockchain

open access: yesThe Journal of The British Blockchain Association, 2022
Blockchain and other Distributed Ledger Technologies (DLTs) have triggered widespread research and interest. This is due to its ability to create redundant, transparent, and accountable connections in various application domains while utilizing ...
Bakhtiyor Yokubov, Lu Gan
doaj   +1 more source

Template Attack of LWE/LWR-Based Schemes with Cyclic Message Rotation

open access: yesEntropy, 2022
The side-channel security of lattice-based post-quantum cryptography has gained extensive attention since the standardization of post-quantum cryptography.
Yajing Chang   +3 more
doaj   +1 more source

PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge

open access: yesIEEE Access
Blockchain technology has produced effective solutions and provides security by using cryptographic tools for various applications, attracting attention from the academic community.
Bora Bugra Sezer   +2 more
doaj   +1 more source

A new non-commutative key exchange protocol on combinatorial semigroup

open access: yesAutomatika
Since the launch of the post-quantum cryptography standardization project by NIST, post-quantum cryptography has become a prominent research area. Non-commutative cryptography constructed using NP-complete problems is widely regarded resistant to quantum
Jing Zhang, Ya-Juan Yang, JingJing Bao
doaj   +1 more source

Exploring Post Quantum Cryptography with Quantum Key Distribution for Sustainable Mobile Network Architecture Design [PDF]

open access: yesPECS@HPDC
The proliferation of mobile networks and their increasing importance to modern life, combined with the emerging threat of quantum computing, present new challenges and opportunities for cyber-security.
Sanzida Hoque   +2 more
semanticscholar   +1 more source

Implementing Post-quantum Cryptography for Developers

open access: yesSN Computer Science, 2023
AbstractWidely used public key cryptography is threatened by the development of quantum computers. Post-quantum algorithms have been designed for the purpose of protecting sensitive data against attacks with quantum computers. National Institute of Standards and Technology has recently reached the end of the third round of post-quantum standardization ...
Hekkala Julius   +4 more
openaire   +7 more sources

DAGS: Key encapsulation using dyadic GS codes

open access: yesJournal of Mathematical Cryptology, 2018
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo   +12 more
doaj   +1 more source

Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)

open access: yesEnergies, 2022
Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems.
Jongmin Ahn   +7 more
doaj   +1 more source

Analyzing the research impact in post quantum cryptography through scientometric evaluation

open access: yesDiscover Computing
The accelerated pace of development in the Field of Quantum Computing is very alarming for many of the presently used cryptographic algorithms such as RSA and ECC underlying much of security in the modern world.
Basil Hanafi, Mohammad Ali
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy