Results 61 to 70 of about 36,975 (185)

Post-quantum Cryptography in 6G

open access: yes, 2021
The quantum computing paradigm is fundamentally different from the classical one. There are computational problems we are not able to solve on a contemporary computer, but which we can efficiently solve on a quantum one. One of these problems is the discrete logarithm problem (DLP) which is the basis of modern asymmetric cryptography.
openaire   +2 more sources

Post-quantum Cryptography: Code-Based Signatures [PDF]

open access: yes, 2010
This survey provides a comparative overview of code-based signature schemes with respect to security and performance. Furthermore, we explicitly describe serveral code-based signature schemes with additional properties such as identity-based, threshold ring and blind signatures.
Cayrel, Pierre-Louis, Meziani, Mohammed
openaire   +2 more sources

Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices

open access: yesJournal of Cybersecurity and Privacy
The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques.
J. Cameron Patterson   +2 more
doaj   +1 more source

A Hybrid Key Generator Model Based on Multiscale Prime Sieve and Quantum-Inspired Approaches

open access: yesApplied Sciences
This article examines a hybrid generation of cryptographic keys, whose novelty lies in the fusion of a multiscale subkey generation with prime sieve and subkeys inspired by quantum mechanics.
Gerardo Iovane, Elmo Benedetto
doaj   +1 more source

Experimental Integration of Quantum Key Distribution and Post‐Quantum Cryptography in a Hybrid Quantum‐Safe Cryptosystem

open access: yesAdvanced Quantum Technologies
Quantum key distribution (QKD) and post‐quantum cryptography (PQC) are the two counter measures against cryptographic attacks via quantum computing. While QKD offers information theoretic security but limited authentication scalability, PQC facilitates ...
L. Garms   +9 more
semanticscholar   +1 more source

Quantum Cryptography Protocols Ensuring Secure Communication in the Era of Quantum Computing [PDF]

open access: yesITM Web of Conferences
Quantum cryptography has emerged as a revolutionary technology for ensuring secure communication in the era of quantum computing. While existing research primarily focuses on theoretical frameworks and small-scale experimental setups, significant ...
J Kamalakumari   +5 more
doaj   +1 more source

A Highly-efficient Lattice-based Post-Quantum Cryptography Processor for IoT Applications

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst.
Lattice-Based Cryptography (LBC) schemes, like CRYSTALS-Kyber and CRYSTALS-Dilithium, have been selected to be standardized in the NIST Post-Quantum Cryptography standard. However, implementing these schemes in resourceconstrained Internet-of-Things (IoT)
Zewen Ye   +5 more
semanticscholar   +1 more source

Hardware Circuits and Systems Design for Post-Quantum Cryptography—A Tutorial Brief

open access: yesIEEE Transactions on Circuits and Systems - II - Express Briefs
Due to the increasing threats from possible large-scale quantum computers, post-quantum cryptography (PQC) has drawn significant attention from various communities recently.
Jiafeng Xie   +4 more
semanticscholar   +1 more source

A Comprehensive Survey on Pre Versus Post Quantum Security Schemes for 5G-Enabled IoT Applications

open access: yesIEEE Access
The proliferation of 5th generation (5G) technology has catalyzed significant advancements in various application of Internet of Things (IoT) such as Intelligent Transportation Systems, Smart Energy, Industrial IoT (IIoT), Digital Twins, Autonomous ...
Bikramjit Choudhury   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy