Results 51 to 60 of about 2,903 (146)
Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki +2 more
doaj +1 more source
Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution [PDF]
Once a cryptographically relevant quantum computer is built, confidential information that is communicated today can be decrypted and exposed. Key exchange methods currently used can then be broken and the key used to protect the data can be recovered ...
Aquina, Nick +2 more
core +1 more source
Quantum computing threatens the long-term security of widely deployed public-key cryptography used to protect medical image transfer. The Digital Imaging and Communications in Medicine (DICOM) standard is the dominant format and protocol suite for ...
Nino Ricchizzi +3 more
doaj +1 more source
Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions [PDF]
Quantum computing poses a significant threat to existing cryptosystems, as Shor's and Grover's algorithms efficiently solve the underlying mathematical problems of classical cryptographic algorithms.
Fernando, Prageeth
core +2 more sources
Human and Technical Factors in the Adoption of Quantum Cryptographic Algorithms [PDF]
The purpose of this research is to understand what factors would cause users to choose quantum key distribution (QKD) over other methods of cryptography.
Pinkston, Alyssa
core +1 more source
Improving quantum metrology protocols with programmable photonic circuits
Abstract Photonic quantum metrology enables the measurement of physical parameters with precision surpassing classical limits by using quantum states of light. However, generating states providing a large metrological advantage is hard because standard probabilistic methods suffer from low generation rates.
Alberto Muñoz de las Heras +2 more
wiley +1 more source
Quantum-resistant Transport Layer Security [PDF]
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain +6 more
core +3 more sources
Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim +3 more
wiley +1 more source
Post-Quantum Migration of the Tor Application
The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt ...
Denis Berger +2 more
doaj +1 more source
Post-Quantum Cryptography(PQC): Generalized ElGamal Cipher over GL(8,F251)
6 pages, 6 Tables, 14 ...
openaire +2 more sources

