State-of-the-art analysis of quantum cryptography: applications and future prospects
Quantum computing provides a revolution in computational competences, leveraging the principles of quantum mechanics to process data in fundamentally novel ways. This paper explores the profound implications of quantum computing on cryptography, focusing
Swastik Kumar Sahu, Kaushik Mazumdar
doaj +1 more source
Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography. [PDF]
Djordjevic IB.
europepmc +1 more source
Post-Quantum Crystography System for Secure Electronic Voting
Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems.
Junior Gabriel Arome +4 more
doaj +1 more source
A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications. [PDF]
Costa VLRD, López J, Ribeiro MV.
europepmc +1 more source
Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography
Currently, with the threat of quantum computer attacks, the idea of combining several same-type primitives has reemerged. This is also the case for cryptographic keys where a hybrid quantum key exchange combination allows for preserving the security ...
Sara Ricci +4 more
semanticscholar +1 more source
Efficient Post-Quantum Cryptography Algorithms for Auto-Enrollment in Public Key Infrastructure
The security of the digital certificates used in authenticating network devices relies on cryptographic algorithms like the RSA and ECC, which are vulnerable to quantum attacks.
Rehab Al-Dabbagh +2 more
semanticscholar +1 more source
Post-Quantum Cryptography in Satellite Internet: Applications and Reflections
With the ongoing development of quantum computers, the security of satellite Internet faces significant challenges. This paper first introduced the basic concepts of satellite Internet and post-quantum cryptography, thoroughly analyzed the security needs
HUANG Boxue, GU Xin, SHAN Chao, SU An
doaj
Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan +4 more
semanticscholar +1 more source
The progress made in the field of quantum computing has drawn the attention of the cryptographic community to the existing systems’ security.
Dereje Wasihun Mellese +7 more
doaj +1 more source
Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography
The swift advancement of quantum computing devices holds the potential to create robust machines that can tackle an extensive array of issues beyond the scope of conventional computers.
Maria E. Sabani +2 more
semanticscholar +1 more source

