Post-quantum Cryptography in 6G
The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a contemporary computer, but which we can efficiently solve on a quantum one. One of these problems is the discrete logarithm problem (DLP) which is the basis of modern asymmetric cryptography.
openaire +2 more sources
Post-quantum Cryptography: Code-Based Signatures [PDF]
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.
Cayrel, Pierre-Louis, Meziani, Mohammed
openaire +2 more sources
Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices
The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques.
J. Cameron Patterson +2 more
doaj +1 more source
A Hybrid Key Generator Model Based on Multiscale Prime Sieve and Quantum-Inspired Approaches
This article examines a hybrid generation of cryptographic keys, whose novelty lies in the fusion of a multiscale subkey generation with prime sieve and subkeys inspired by quantum mechanics.
Gerardo Iovane, Elmo Benedetto
doaj +1 more source
Quantum key distribution (QKD) and post‐quantum cryptography (PQC) are the two counter measures against cryptographic attacks via quantum computing. While QKD offers information theoretic security but limited authentication scalability, PQC facilitates ...
L. Garms +9 more
semanticscholar +1 more source
Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum Computing [PDF]
Quantum cryptography has emerged as a revolutionary technology for ensuring secure communication in the era of quantum computing. While existing research primarily focuses on theoretical frameworks and small-scale experimental setups, significant ...
J Kamalakumari +5 more
doaj +1 more source
A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard. However, implementing these schemes in resourceconstrained Internet-of-Things (IoT)
Zewen Ye +5 more
semanticscholar +1 more source
Hardware Circuits and Systems Design for Post-Quantum Cryptography—A Tutorial Brief
Due to the increasing threats from possible large-scale quantum computers, post-quantum cryptography (PQC) has drawn significant attention from various communities recently.
Jiafeng Xie +4 more
semanticscholar +1 more source
A Comprehensive Survey on Pre Versus Post Quantum Security Schemes for 5G-Enabled IoT Applications
The proliferation of 5th generation (5G) technology has catalyzed significant advancements in various application of Internet of Things (IoT) such as Intelligent Transportation Systems, Smart Energy, Industrial IoT (IIoT), Digital Twins, Autonomous ...
Bikramjit Choudhury +5 more
doaj +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source

