Results 31 to 40 of about 3,134 (166)
Secure Deployment of Smart Meters
A secure initialization process for smart meters is designed based on a systematic cybersecurity risk analysis of the deployment phase. Three initialization variants are defined and compared with respect to security, operational feasibility, and trust distribution.
David Kohout +4 more
wiley +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems.
Tyler Cultice, Himanshu Thapliyal
doaj +1 more source
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction.
AW Dent +23 more
core +2 more sources
This paper presents a hybrid security framework for vehicular ad hoc networks that combines lightweight elliptic curve cryptography with quantum‐resistant post‐quantum cryptography, coordinated through fog computing and software‐defined networking.
Adi El‐Dalahmeh +2 more
wiley +1 more source
Security in Post-Quantum Era: A Comprehensive Survey on Lattice-Based Algorithms
Lattice-based post-quantum cryptography (PQC) has attracted significant attention as a promising solution to the security challenges posed by quantum computing.
Hien Nguyen +3 more
doaj +1 more source
The roles of quantum correlations in quantum cloning
In this paper, we study the entanglement and quantum discord of the output modes in the unified $1\rightarrow 2$ state-dependent cloning and probabilistic quantum cloning. The tripartite entanglement among the output modes and the quantum cloning machine
Wu, Shao-xiong +2 more
core +1 more source
Quantum Machine Learning Applications to Medical Images: A Survey
In this review paper, we provide an outline of quantum neural networks (QNNs), quantum convolution neural networks (QCNNs) and various hybrid models. We also explore human brain‐inspired quantum neuromorphic computing by the quantum spiking neural networks (QSNN).
Mahua Nandy Pal +2 more
wiley +1 more source
The pace of quantum computing development necessitates not only the adoption of post-quantum cryptographic algorithms, but also the establishment of an executable and auditable institutional transition process.
Berat Birgin, Baris Celiktas
doaj +1 more source
Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC [PDF]
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development.
de Jong, Jins +4 more
core +3 more sources

