Results 61 to 70 of about 3,134 (166)
Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions [PDF]
Quantum computing poses a significant threat to existing cryptosystems, as Shor's and Grover's algorithms efficiently solve the underlying mathematical problems of classical cryptographic algorithms.
Fernando, Prageeth
core +2 more sources
Side-Channel Analysis on Post-Quantum Cryptography Algorithms [PDF]
The advancements of quantum computers brings us closer to the threat of our current asymmetric cryptography algorithms being broken by Shor\u27s Algorithm.
Teague, Tristen
core +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source
Towards Managing the Migration to Post-Quantum-Cryptography
As soon as cryptographically relevant quantum computers exist, they can break today's prevalent asymmetric cryptographic algorithms. Organizations (and the IT society) have to plan on migrating to quantum-resilient cryptographic measures, also known as ...
Alnahawi, Nouri +4 more
core
NewHope: A Mobile Implementation of a Post-Quantum Cryptographic Key Encapsulation Mechanism [PDF]
NIST anticipates the appearance of large-scale quantum computers by 2036 [34], which will threaten widely used asymmetric algorithms, National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography Standardization Project to ...
Switzler, Jessica A.
core +1 more source
Improving quantum metrology protocols with programmable photonic circuits
Abstract Photonic quantum metrology enables the measurement of physical parameters with precision surpassing classical limits by using quantum states of light. However, generating states providing a large metrological advantage is hard because standard probabilistic methods suffer from low generation rates.
Alberto Muñoz de las Heras +2 more
wiley +1 more source
We design a model of Post Quantum Cryptography (PQC) Quantum Federated Learning (QFL). We develop a framework with a dynamic server selection and study convergence and security conditions.
Gurung, Dev +2 more
core
Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim +3 more
wiley +1 more source
Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being employed across a broad spectrum of applications, ranging from military operations to commercial purposes.
Muhammad Asghar Khan +4 more
doaj +1 more source
AI and post-quantum cryptography powered cybersecurity approaches for IoT systems: a literature review [PDF]
The rapid expansion of the Internet of Things (IoT) has introduced significant cybersecurity challenges across healthcare, industrial systems, and smart cities. Existing security models provide limited protection due to weak authentication, heterogeneous
Mozamel M. Saeed, Fahad Alqahtani
doaj +2 more sources

