Results 71 to 80 of about 2,903 (146)

On the Performance and Security of Multiplication in GF(2N)

open access: yesCryptography, 2018
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger   +8 more
doaj   +1 more source

Post-Quantum Cryptography (PQC) for Cooperative ITS: ready for transition?

open access: yes, 2023
Quantum Computing raises new threats to C-ITSx. When a cryptographically-relevant Quantum Computer becomes available, classical asymmetric crypto standards might be broken: No more trust in PKI PQC. Benchmark goal is to assess whether PQC algorithms can be used on common hardware without impacting C-ITS standards.
openaire   +1 more source

Feasibility of Quantum Key Distribution Between Supersonic Aircraft

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
Quantum key distribution (QKD) leverages the laws of quantum mechanics to enable the secure transfer of information and is the only known method of key exchange capable of providing verifiable security. We first survey the academic literature and identify gaps in research relating to airborne QKD, establishing a foundation for our own study ...
Solomon Raphael McKiernan   +1 more
wiley   +1 more source

x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 349-359, December 2024.
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley   +1 more source

LOKI Low-Latency Open-Source Kyber-Accelerator IPs [PDF]

open access: yes
CRYSTALS-Kyber is a lattice-based key encapsulation mechanism (KEM) recognized as one of the finalist algorithms in NIST’s post-quantum cryptography (PQC) standardization process.
Dolmeta, Alessandra   +3 more
core   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions

open access: yesCryptography
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing.
Sang-Yoon Chang, Qaiser Khan
doaj   +1 more source

Post-Quantum TLS on Embedded Systems [PDF]

open access: yes, 2020
We present our integration of post-quantum cryptography (PQC), more specifically of the post-quantum KEM scheme Kyber for key establishment and the post-quantum signature scheme SPHINCS$^+$, into the embedded TLS library mbed TLS.
Christoph Krauß   +3 more
core  

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

open access: yesApplied Sciences
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim   +4 more
doaj   +1 more source

High-speed Parallel Implementation of Lattice-based Cryptography Based on AVX512 [PDF]

open access: yesJisuanji gongcheng
The rapid development of quantum computing seriously threatens the security of widely used public-key cryptography. Lattice-based cryptography occupies an essential position in Post-Quantum Cryptography(PQC) owing to its excellent anti-quantum security ...
Douwei LEI, Debiao HE, Min LUO, Cong PENG
doaj   +1 more source

Home - About - Disclaimer - Privacy