Results 111 to 120 of about 2,903 (146)
Some of the next articles are maybe not open access.
Post Quantum Cryptography(PQC) - An overview: (Invited Paper)
2020 IEEE High Performance Extreme Computing Conference (HPEC), 2020We discuss the Post Quantum Cryptography algorithms for key establishment under consideration by NIST for standardization. Three of these, Crystals- Kyber, Classic McEliece and Supersingular Isogeny based Key Encapsulation (SIKE), are representatives of the three classes of hard problems underlying the security of almost all 69 candidate algorithms ...
Manoj Kumar, Pratap Pattnaik
openaire +1 more source
Post-Quantum Cryptography (PQC) for Identity Management
ADHYAYAN: A JOURNAL OF MANAGEMENT SCIENCES, 2022The impending arrival of viable quantum computing is a major worry to modern-day identity management systems that mainly depend on classical public-key cryptography techniques such as RSA and elliptic curve. Such systems are the basis of secure infrastructure in digital identities such as authentication, digital signature and trust models based on ...
openaire +1 more source
Quantum Computing Using Cryptographic Algorithm - Post- Quantum Cryptography(PQC) Chat Application
With the growth of quantum computing in power, cryptographic protocols such as RSA and ECC have plenty to worry about with potential attacks that can break security in digital communication. Current research investigates the use of post-quantum cryptography (PQC) in the development of a quantum-resistant chat application centered on Kyber, a lattice ...Rawal, Jay Kumar +3 more
openaire +1 more source
Blockchain-based Voting System Powered by Post-Quantum Cryptography (BBVSP-PQC)
2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T), 2022Sweta Gupta +3 more
openaire +1 more source
Neutrosophic Analysis of Rejection Sampling in Post Quantum Cryptography (PQC)
Digital authentication and key encapsulation mechanisms (KEM) are two basic primitives for the security level of all robotic and IoT systems. Dilithium and Kyber are two post-quantum algorithms to establish secure communication. The use of uniform random sampling in these algorithms is very important. The finalists Dilithium and Kyber use SHAKE and AESopenaire +1 more source
Security in quantum cryptography
Reviews of Modern Physics, 2022Christopher Portmann, Renato Renner
exaly
Entanglement-based secure quantum cryptography over 1,120 kilometres
Nature, 2020Juan Yin, Yu-Huai Li, Sheng-Kai Liao
exaly
Meta-optics empowered vector visual cryptography for high security and rapid decryption
Nature Communications, 2023Mingbo Pu, Xiangang Luo
exaly
Virtual Private Network (VPN) with Post-Quantum Cryptography (PQC)
2024 15th International Conference on Information and Communication Technology Convergence (ICTC)Hyoungsub Shim +4 more
openaire +1 more source

