Results 51 to 60 of about 36,975 (185)

Cost-Efficient Pipelined Modular Polynomial Multiplier for Post-Quantum Cryptography Saber

open access: yesQuantum Reports
The development of quantum computers presents a great challenge for current cryptographic algorithms. Post-quantum cryptography has been proposed to secure against quantum computers in the near future.
Hua Li
doaj   +1 more source

Multi-LFSR Architectures for BRLWE-Based Post Quantum Cryptography

open access: yesIEEE Access
The advancement in quantum computing has led to a significant progress in the development of public-key cryptosystems, referred as Post Quantum Cryptography (PQC) which has robust security to withstand both classical and quantum attacks.
Shaik Ahmadunnisa, Sudha Ellison Mathe
doaj   +1 more source

PQ-LEACH: A novel post-quantum protocol for securing WSNs communication

open access: yesInternational Journal of Engineering Business Management
Ensuring the confidentiality of communication is of paramount significance. Traditionally, cryptographic practices for Wireless Sensor Networks (WSN) have been primarily based on classical cryptography like RSA and Elliptic Curve, which are potentially ...
Shaykhah S Aldosari, Layla S Aldawsari
doaj   +1 more source

Post-Quantum Cryptography

open access: yes, 2014
In dieser Arbeit diskutieren wir neue Primitiven für Public-Key-Kryptographie, die sich als Alternativen zu den derzeit verwendeten RSA und ECC Kryptosystemen etablieren könnten. Die Analyse dieser Primitiven aus der Perspektive eines Entwicklers, zeigt dieVorteile der neuen Systeme.
openaire   +3 more sources

Quantum key distribution through quantum machine learning: a research review

open access: yesFrontiers in Quantum Science and Technology
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures ...
Krupa Purohit, Ajay Kumar Vyas
doaj   +1 more source

Quantum vs post‐quantum security for future networks: Survey

open access: yesCyber Security and Applications
Classical cryptography (crypt) schemes (sche) have been compromised by the practical results on quantum (q) computers in recent years. Nowadays these sche ‘s can be compromised by using the Shor's methodology. This paper provides a detailed survey of the
Savo Glisic
doaj   +1 more source

Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

open access: yesComputers
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD).
Farshad Rahimi Ghashghaei   +3 more
doaj   +1 more source

Performance Analysis of Post-Quantum Cryptography Algorithms for Digital Signature

open access: yesApplied Sciences
In the face of advancing quantum computing capabilities posing significant threats to current cryptographic protocols, the need for post-quantum cryptography has become increasingly urgent.
Filip Opiłka   +3 more
semanticscholar   +1 more source

Migrating Software Systems Toward Post-Quantum Cryptography-A Systematic Literature Review [PDF]

open access: yesIEEE Access
Networks such as the Internet are essential for our connected world. Quantum computing threatens its fundamental security mechanisms. Therefore, a migration to post-quantum-cryptography (PQC) is necessary for networks and their components.
Christian Näther   +5 more
semanticscholar   +1 more source

Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography

open access: yesCryptogr.
Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security.
Gregory Fitzgibbon, C. Ottaviani
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy