Results 21 to 30 of about 2,903 (146)

QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging [PDF]

open access: yes, 2023
ISO 15118 enables charging and billing of Electric Vehicles (EVs) without user interaction by using locally installed cryptographic credentials that must be secure over the long lifetime of vehicles.
Alnahawi, Nouri   +5 more
core   +1 more source

A Survey of Cryptographic Algorithms in Cybersecurity: From Classical Methods to Quantum-Resistant Solutions

open access: yesShifra, 2023
As quantum computing technology evolves, it poses greater risks to current cryptography schemes such as RSA and Elliptic Curve Cryptography (ECC), widely used to secure digital communications These classical algorithms are based on mathematical problems
Swapnali N Tambe-Jagtap
doaj   +1 more source

Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order

open access: yes, 2017
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core   +1 more source

Experimental authentication of quantum key distribution with post-quantum cryptography

open access: yesnpj Quantum Information, 2021
Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys ...
Liu-Jun Wang   +11 more
doaj   +1 more source

Ramanujan graphs in cryptography [PDF]

open access: yes, 2018
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in ...
Costache, Anamaria   +4 more
core   +2 more sources

Gaussian Quantum Information [PDF]

open access: yes, 2011
The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits.
Arthurs, E.   +48 more
core   +2 more sources

Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways

open access: yes2024 IEEE International Conference on Quantum Computing and Engineering (QCE)
The problem of adopting quantum-resistant cryptographic network protocols or post-quantum cryptography (PQC) is critically important to democratizing quantum computing. The problem is urgent because practical quantum computers will break classical encryption in the next few decades. Past encrypted data has already been collected and can be decrypted in
Sowa, Jakub   +6 more
openaire   +2 more sources

A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication

open access: yesNetwork
Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives.
Babatunde Ojetunde   +4 more
doaj   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

A Survey of Post-Quantum Cryptography Migration in Vehicles

open access: yesIEEE Access
The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. A promising solution to ensure the continued security attributes of confidentiality, integrity, and availability is the use of Post-Quantum Cryptography ...
Nils Lohmiller   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy