Results 71 to 80 of about 36,975 (185)

State-of-the-art analysis of quantum cryptography: applications and future prospects

open access: yesFrontiers in Physics
Quantum computing provides a revolution in computational competences, leveraging the principles of quantum mechanics to process data in fundamentally novel ways. This paper explores the profound implications of quantum computing on cryptography, focusing
Swastik Kumar Sahu, Kaushik Mazumdar
doaj   +1 more source

Post-Quantum Crystography System for Secure Electronic Voting

open access: yesOpen Computer Science, 2019
Security (privacy, confidentiality and integrity) of pre-electoral, electoral and post electoral phases of the electioneering process is fundamental to the success of Electronic Voting (E-Voting) Systems.
Junior Gabriel Arome   +4 more
doaj   +1 more source

Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography

open access: yesIEEE Access
Currently, with the threat of quantum computer attacks, the idea of combining several same-type primitives has reemerged. This is also the case for cryptographic keys where a hybrid quantum key exchange combination allows for preserving the security ...
Sara Ricci   +4 more
semanticscholar   +1 more source

Efficient Post-Quantum Cryptography Algorithms for Auto-Enrollment in Public Key Infrastructure

open access: yesElectronics
The security of the digital certificates used in authenticating network devices relies on cryptographic algorithms like the RSA and ECC, which are vulnerable to quantum attacks.
Rehab Al-Dabbagh   +2 more
semanticscholar   +1 more source

Post-Quantum Cryptography in Satellite Internet: Applications and Reflections

open access: yes天地一体化信息网络
With the ongoing development of quantum computers, the security of satellite Internet faces significant challenges. This paper first introduced the basic concepts of satellite Internet and post-quantum cryptography, thoroughly analyzed the security needs
HUANG Boxue, GU Xin, SHAN Chao, SU An
doaj  

Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

open access: yesIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan   +4 more
semanticscholar   +1 more source

A Systematic Literature Review of Lattice-Based Key Encapsulation Mechanisms and Digital Signatures: Current Status, Research Gaps, and Future Directions

open access: yesIEEE Access
The progress made in the field of quantum computing has drawn the attention of the cryptographic community to the existing systems’ security.
Dereje Wasihun Mellese   +7 more
doaj   +1 more source

Learning with Errors: A Lattice-Based Keystone of Post-Quantum Cryptography

open access: yesSignals
The swift advancement of quantum computing devices holds the potential to create robust machines that can tackle an extensive array of issues beyond the scope of conventional computers.
Maria E. Sabani   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy