Results 41 to 50 of about 2,903 (146)

Signature Split Method for a PQC-DSA Compliant with V2V Communication Standards

open access: yesApplied Sciences, 2023
The development of quantum computing systems poses a great threat to the security of existing public key-based systems. As a result, the National Institute of Standards and Technology (NIST) started a Post-Quantum Cryptography (PQC) standardization ...
Youngbeom Kim, Seog Chung Seo
doaj   +1 more source

Post Quantum Cryptography on Healthcare Security: Safeguarding Patient Data in Medical Systems [PDF]

open access: yes
Quantum computers are capable of solving problems that classical computers cannot, particularly in the realm of cryptographic algorithms such as RSA, DSA, and ECC.
Kumar, Shubham
core   +2 more sources

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts [PDF]

open access: yes, 2017
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduction is not known for the generic construction.
AW Dent   +23 more
core   +2 more sources

Statistical Complexity of Quantum Learning

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 12, December 2025.
The statistical performance of quantum learning is investigated as a function of the number of training data N$N$, and of the number of copies available for each quantum state in the training and testing data sets, respectively S$S$ and V$V$. Indeed, the biggest difference in quantum learning comes from the destructive nature of quantum measurements ...
Leonardo Banchi   +3 more
wiley   +1 more source

Systematic review on securing IoT systems with post quantum cryptography emerging threats, countermeasures, and future research needs

open access: yesDiscover Internet of Things
The rapid deployment of Internet of Things (IoT) devices across critical infrastructure’s sectors such as healthcare, transportation, and smart cities brings unprecedented security challenges; particularly as quantum computing threatens the classical ...
Ketema Adere   +11 more
doaj   +1 more source

Joint QKD-Post-Quantum Cryptosystems

open access: yesIEEE Access, 2020
To extend the transmission distance and/or improve secret-key rate of QKD protocols, we propose to employ the joint QKD-post-quantum cryptosystems in which QKD is used for raw-key transmission while the post-quantum cryptography (PQC) subsystem to ...
Ivan B. Djordjevic
doaj   +1 more source

Comparative Analysis of Classical and Post-Quantum Cryptographic Methods for Secure Digital Signature Implementation in the Quantum Era [PDF]

open access: yes
Rapid improvements in quantum computing have posed substantial hurdles to conventional cryptography systems, which depend on the computational intractability of resolving intricate mathematical issues.
Putra, Rayasa Puringgar Prasadha   +2 more
core   +2 more sources

Quantum Computing in Industrial Internet of Things (IIoT) Forensics: Framework, Implications, Opportunities, and Future Directions

open access: yesWIREs Forensic Science, Volume 7, Issue 3, September 2025.
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley   +1 more source

Hardware Security in the Connected World

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 3, September 2025.
Depicts the components covered in the article. ABSTRACT The rapid proliferation of the Internet of Things (IoT) has integrated billions of smart devices into our daily lives, generating and exchanging vast amounts of critical data. While this connectivity offers significant benefits, it also introduces numerous security vulnerabilities.
Durba Chatterjee   +4 more
wiley   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy