Results 61 to 70 of about 2,903 (146)

The roles of quantum correlations in quantum cloning

open access: yes, 2014
In this paper, we study the entanglement and quantum discord of the output modes in the unified $1\rightarrow 2$ state-dependent cloning and probabilistic quantum cloning. The tripartite entanglement among the output modes and the quantum cloning machine
Wu, Shao-xiong   +2 more
core   +1 more source

NewHope: A Mobile Implementation of a Post-Quantum Cryptographic Key Encapsulation Mechanism [PDF]

open access: yes, 2020
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten widely used asymmetric algorithms, National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography Standardization Project to ...
Switzler, Jessica A.
core   +1 more source

Exploring the landscape of post quantum cryptography: a bibliometric analysis of emerging trends and research impact

open access: yesJournal of Big Data
With the emergence of quantum computers, classical cryptography is facing significant challenges. Address this compelling problem, it is the need of hour to develop Post Quantum cryptography (PQC), or quantum-resistant cryptography.
Taniya Hasija   +3 more
doaj   +1 more source

NIST Post-Quantum Cryptography Standards: A Comprehensive Review of Theoretical Foundations and Implementations

open access: yesIEEE Access
The transition to post-quantum cryptography (PQC) marks a pivotal shift in ensuring digital security, prompted by the potential of quantum computers to compromise classical systems such as Rivest-Shamir-Adlema and elliptic-curve cryptography. In response,
Quang Dang Truong   +3 more
doaj   +1 more source

Side-Channel Analysis on Post-Quantum Cryptography Algorithms [PDF]

open access: yes, 2022
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor\u27s Algorithm.
Teague, Tristen
core   +1 more source

Enhancing Quantum Image Encryption With QLSTM and Chaos Synchronisation Control: A Deep Neural Network Approach

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper presents a quantum image encryption method using QLSTM to enhance chaotic sequences and achieve synchronisation control. The approach improves encryption security and reliability, maintaining high information entropy and complexity under attacks.
Yuebo Wu   +3 more
wiley   +1 more source

Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

open access: yesIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan   +4 more
doaj   +1 more source

Towards Managing the Migration to Post-Quantum-Cryptography

open access: yes, 2023
As soon as cryptographically relevant quantum computers exist, they can break today's prevalent asymmetric cryptographic algorithms. Organizations (and the IT society) have to plan on migrating to quantum-resilient cryptographic measures, also known as ...
Alnahawi, Nouri   +4 more
core  

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Post‐Quantum Digital Signatures for Enhanced Medical Image Security

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy