Results 91 to 100 of about 3,134 (166)
How Companies Address the Threat of Cryptographically Relevant Quantum Computers and Migrate to Post-Quantum Cryptography [PDF]
How companies prepare for the migration to post-quantum cryptography (PQC) remains an open and important question, despite growing awareness of the threat posed by cryptographically relevant quantum computers (CRQCs).
Brettschneider, Jennifer +2 more
core +1 more source
The advancement of quantum computing is increasingly recognized as a significant threat to classical public-key cryptographic systems, triggering a global shift toward Post-Quantum Cryptography (PQC).
Mustafa El Bizri +3 more
doaj +1 more source
The current blockchain system for cryptocurrency exchanges primarily employs elliptic curve cryptography (ECC) for generating key pairs in wallets, and elliptic curve digital signature algorithms (ECDSA) for generating signatures in transactions ...
Chen, Abel C. H.
core
Research on quantum key distribution and post-quantum cryptography fusion
In view of the threat of quantum computing to traditional public key infrastructure, by analyzing the technical complementarity of quantum key distribution (QKD) and post-quantum cryptography (PQC), as well as the necessity for integrating these two ...
LUO Jun
doaj
KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates
As the global migration to post-quantum cryptography (PQC) continues to progress actively, in Korea, the Post-Quantum Cryptography Research Center has been established to acquire PQC technology, leading the KpqC Competition.
Yongryeol Choi +6 more
doaj +1 more source
With the advancement of quantum computing, classical public-key cryptosystems are increasingly vulnerable, prompting global standardization efforts by organizations such as NIST, ETSI, and ISO.
Yong Wang, Eddie Shahril Ismail
doaj +1 more source
Security enhancement for cell broadcast systems based on post-quantum cryptography
A security enhancement scheme based on post-quantum cryptography (PQC) was presented to address the security threats posed to cell broadcast systems in the quantum computing era.
WANG Congli +4 more
doaj
Lattice Based Cryptography GGH & NTRU [PDF]
Developing computer processors and quantum computers requires continuous development of cryptographic algorithms. Researchers in standardization organizations keep experimenting with cryptographic algorithms and the related key sizes to recommend best ...
Soufi, Rasem
core
Towards Side-Channel Infrastructure for Software Implementations of PQC Algorithms [PDF]
Post-Quantum Cryptography (PQC) is a new class of asymmetric cryptography algorithms that are supposed to be secure against both classical computers and quantum computers through Shor’s algorithm.
Teague, Tristen
core +1 more source
Post-quantum cryptographic authentication protocol for industrial IoT using lattice-based cryptography. [PDF]
Shahid AB +4 more
europepmc +1 more source

