Results 51 to 60 of about 2,903 (146)

Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process

open access: yesTechnologies
As quantum computing advances, current cryptographic protocols are increasingly vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) like RSA or Elliptic Curve Cryptography (ECC).
Kanza Cherkaoui Dekkaki   +2 more
doaj   +1 more source

Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution [PDF]

open access: yes
Once a cryptographically relevant quantum computer is built, confidential information that is communicated today can be decrypted and exposed. Key exchange methods currently used can then be broken and the key used to protect the data can be recovered ...
Aquina, Nick   +2 more
core   +1 more source

When classical encryption fails: A non-invasive post-quantum security layer for medical image transfers

open access: yesInformatics in Medicine Unlocked
Quantum computing threatens the long-term security of widely deployed public-key cryptography used to protect medical image transfer. The Digital Imaging and Communications in Medicine (DICOM) standard is the dominant format and protocol suite for ...
Nino Ricchizzi   +3 more
doaj   +1 more source

Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions [PDF]

open access: yes
Quantum computing poses a significant threat to existing cryptosystems, as Shor's and Grover's algorithms efficiently solve the underlying mathematical problems of classical cryptographic algorithms.
Fernando, Prageeth
core   +2 more sources

Human and Technical Factors in the Adoption of Quantum Cryptographic Algorithms [PDF]

open access: yes, 2023
The purpose of this research is to understand what factors would cause users to choose quantum key distribution (QKD) over other methods of cryptography.
Pinkston, Alyssa
core   +1 more source

Improving quantum metrology protocols with programmable photonic circuits

open access: yesNanophotonics, Volume 14, Issue 11, Page 2075-2085, June 2025.
Abstract Photonic quantum metrology enables the measurement of physical parameters with precision surpassing classical limits by using quantum states of light. However, generating states providing a large metrological advantage is hard because standard probabilistic methods suffer from low generation rates.
Alberto Muñoz de las Heras   +2 more
wiley   +1 more source

Quantum-resistant Transport Layer Security [PDF]

open access: yes
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology.
Guilley, Sylvain   +6 more
core   +3 more sources

Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 3, March 2025.
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim   +3 more
wiley   +1 more source

Post-Quantum Migration of the Tor Application

open access: yesJournal of Cybersecurity and Privacy
The efficiency of Shor’s and Grover’s algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one’s privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decrypt ...
Denis Berger   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy