Results 21 to 30 of about 3,134 (166)

QuantumCharge: Post-Quantum Cryptography for Electric Vehicle Charging [PDF]

open access: yes, 2023
ISO 15118 enables charging and billing of Electric Vehicles (EVs) without user interaction by using locally installed cryptographic credentials that must be secure over the long lifetime of vehicles.
Alnahawi, Nouri   +5 more
core   +1 more source

Conceptual Review on Number Theoretic Transform and Comprehensive Review on Its Implementations

open access: yesIEEE Access, 2023
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE).
Ardianto Satriawan   +5 more
doaj   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

High-Performance VLSI Architectures for Lattice-Based Cryptography [PDF]

open access: yes, 2022
Lattice-based cryptography is a cryptographic primitive built upon the hard problems on point lattices. Cryptosystems relying on lattice-based cryptography have attracted huge attention in the last decade since they have post-quantum-resistant security ...
Tan, Weihang
core   +1 more source

Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order

open access: yes, 2017
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer ...
Hecht, Pedro
core   +1 more source

Simulation and analysis of a QKD-PQC protocol for secure communication channel authentication [PDF]

open access: yesEPJ Web of Conferences
Quantum computing threatens traditional cryptographic systems based on integer factorization and discrete logarithm problems. This paper proposes a hybrid secure communication framework integrating Quantum Key Distribution (QKD) with Post-Quantum ...
Sandhia G.K.   +4 more
doaj   +1 more source

Gaussian Quantum Information [PDF]

open access: yes, 2011
The science of quantum information has arisen over the last two decades centered on the manipulation of individual quanta of information, known as quantum bits or qubits.
Arthurs, E.   +48 more
core   +2 more sources

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

Research Status, Challenges, and Future Development of Post-Quantum Cryptography [PDF]

open access: yes中国工程科学
As an important strategic resource for safeguarding national information security and the healthy development of digital economy, cryptography is the cornerstone of protecting the security of critical infrastructure, government affairs data, financial ...
Guizhen Zhu   +5 more
doaj   +1 more source

A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication

open access: yesNetwork
Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives.
Babatunde Ojetunde   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy