Results 91 to 100 of about 2,903 (146)
Unveiling Samsung Quantum Galaxy: Securing Smartphones With Quantum and Post-Quantum Cryptography
Quantum technologies have emerged as vital tools for enhancing mobile communication security. The Samsung Galaxy series now features a quantum random number generator (QRNG) that offers true randomness, strengthening cryptographic protection. Despite its
Omar Alibrahim
doaj +1 more source
This survey is on forward-looking, emerging security concerns in post-quantum era, i.e., the implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) competition and thus the visions, insights, and discussions can be used as a step
Azarderakhsh, Reza +3 more
core
PQ-LEACH: A novel post-quantum protocol for securing WSNs communication
Ensuring the confidentiality of communication is of paramount significance. Traditionally, cryptographic practices for Wireless Sensor Networks (WSN) have been primarily based on classical cryptography like RSA and Elliptic Curve, which are potentially ...
Shaykhah S Aldosari, Layla S Aldawsari
doaj +1 more source
The advancement of quantum computing is increasingly recognized as a significant threat to classical public-key cryptographic systems, triggering a global shift toward Post-Quantum Cryptography (PQC).
Mustafa El Bizri +3 more
doaj +1 more source
The current blockchain system for cryptocurrency exchanges primarily employs elliptic curve cryptography (ECC) for generating key pairs in wallets, and elliptic curve digital signature algorithms (ECDSA) for generating signatures in transactions ...
Chen, Abel C. H.
core
With the emergence of quantum computing, traditional cryptographic methods face significant vulnerabilities, particularly in the Industrial Internet of Things (IIoT) environment, where cybersecurity, data privacy, and trust management are critical.
Gasim Alandjani
doaj +1 more source
With the advancement of quantum computing, classical public-key cryptosystems are increasingly vulnerable, prompting global standardization efforts by organizations such as NIST, ETSI, and ISO.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
How Companies Address the Threat of Cryptographically Relevant Quantum Computers and Migrate to Post-Quantum Cryptography [PDF]
How companies prepare for the migration to post-quantum cryptography (PQC) remains an open and important question, despite growing awareness of the threat posed by cryptographically relevant quantum computers (CRQCs).
Brettschneider, Jennifer +2 more
core +1 more source
Research on quantum key distribution and post-quantum cryptography fusion
In view of the threat of quantum computing to traditional public key infrastructure, by analyzing the technical complementarity of quantum key distribution (QKD) and post-quantum cryptography (PQC), as well as the necessity for integrating these two ...
LUO Jun
doaj
KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates
As the global migration to post-quantum cryptography (PQC) continues to progress actively, in Korea, the Post-Quantum Cryptography Research Center has been established to acquire PQC technology, leading the KpqC Competition.
Yongryeol Choi +6 more
doaj +1 more source

