Results 41 to 50 of about 2,903 (146)
Signature Split Method for a PQC-DSA Compliant with V2V Communication Standards
The development of quantum computing systems poses a great threat to the security of existing public key-based systems. As a result, the National Institute of Standards and Technology (NIST) started a Post-Quantum Cryptography (PQC) standardization ...
Youngbeom Kim, Seog Chung Seo
doaj +1 more source
Post Quantum Cryptography on Healthcare Security: Safeguarding Patient Data in Medical Systems [PDF]
Quantum computers are capable of solving problems that classical computers cannot, particularly in the realm of cryptographic algorithms such as RSA, DSA, and ECC.
Kumar, Shubham
core +2 more sources
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction.
AW Dent +23 more
core +2 more sources
Statistical Complexity of Quantum Learning
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi +3 more
wiley +1 more source
The rapid deployment of Internet of Things (IoT) devices across critical infrastructure’s sectors such as healthcare, transportation, and smart cities brings unprecedented security challenges; particularly as quantum computing threatens the classical ...
Ketema Adere +11 more
doaj +1 more source
Joint QKD-Post-Quantum Cryptosystems
To extend the transmission distance and/or improve secret-key rate of QKD protocols, we propose to employ the joint QKD-post-quantum cryptosystems in which QKD is used for raw-key transmission while the post-quantum cryptography (PQC) subsystem to ...
Ivan B. Djordjevic
doaj +1 more source
Comparative Analysis of Classical and Post-Quantum Cryptographic Methods for Secure Digital Signature Implementation in the Quantum Era [PDF]
Rapid improvements in quantum computing have posed substantial hurdles to conventional cryptography systems, which depend on the computational intractability of resolving intricate mathematical issues.
Putra, Rayasa Puringgar Prasadha +2 more
core +2 more sources
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Hardware Security in the Connected World
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee +4 more
wiley +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source

