Results 61 to 70 of about 3,134 (166)

Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions [PDF]

open access: yes
Quantum computing poses a significant threat to existing cryptosystems, as Shor's and Grover's algorithms efficiently solve the underlying mathematical problems of classical cryptographic algorithms.
Fernando, Prageeth
core   +2 more sources

Side-Channel Analysis on Post-Quantum Cryptography Algorithms [PDF]

open access: yes, 2022
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor\u27s Algorithm.
Teague, Tristen
core   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Towards Managing the Migration to Post-Quantum-Cryptography

open access: yes, 2023
As soon as cryptographically relevant quantum computers exist, they can break today's prevalent asymmetric cryptographic algorithms. Organizations (and the IT society) have to plan on migrating to quantum-resilient cryptographic measures, also known as ...
Alnahawi, Nouri   +4 more
core  

NewHope: A Mobile Implementation of a Post-Quantum Cryptographic Key Encapsulation Mechanism [PDF]

open access: yes, 2020
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten widely used asymmetric algorithms, National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography Standardization Project to ...
Switzler, Jessica A.
core   +1 more source

Improving quantum metrology protocols with programmable photonic circuits

open access: yesNanophotonics, Volume 14, Issue 11, Page 2075-2085, June 2025.
Abstract Photonic quantum metrology enables the measurement of physical parameters with precision surpassing classical limits by using quantum states of light. However, generating states providing a large metrological advantage is hard because standard probabilistic methods suffer from low generation rates.
Alberto Muñoz de las Heras   +2 more
wiley   +1 more source

Secure Communication Model For Quantum Federated Learning: A Post Quantum Cryptography (PQC) Framework

open access: yes, 2023
We design a model of Post Quantum Cryptography (PQC) Quantum Federated Learning (QFL). We develop a framework with a dynamic server selection and study convergence and security conditions.
Gurung, Dev   +2 more
core  

Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 3, March 2025.
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim   +3 more
wiley   +1 more source

Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

open access: yesIEEE Open Journal of the Communications Society
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan   +4 more
doaj   +1 more source

AI and post-quantum cryptography powered cybersecurity approaches for IoT systems: a literature review [PDF]

open access: yesPeerJ Computer Science
The rapid expansion of the Internet of Things (IoT) has introduced significant cybersecurity challenges across healthcare, industrial systems, and smart cities. Existing security models provide limited protection due to weak authentication, heterogeneous
Mozamel M. Saeed, Fahad Alqahtani
doaj   +2 more sources

Home - About - Disclaimer - Privacy