Results 71 to 80 of about 2,903 (146)
On the Performance and Security of Multiplication in GF(2N)
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger +8 more
doaj +1 more source
Post-Quantum Cryptography (PQC) for Cooperative ITS: ready for transition?
Quantum Computing raises new threats to C-ITSx. When a cryptographically-relevant Quantum Computer becomes available, classical asymmetric crypto standards might be broken: No more trust in PKI PQC. Benchmark goal is to assess whether PQC algorithms can be used on common hardware without impacting C-ITS standards.
openaire +1 more source
Feasibility of Quantum Key Distribution Between Supersonic Aircraft
Quantum key distribution (QKD) leverages the laws of quantum mechanics to enable the secure transfer of information and is the only known method of key exchange capable of providing verifiable security. We first survey the academic literature and identify gaps in research relating to airborne QKD, establishing a foundation for our own study ...
Solomon Raphael McKiernan +1 more
wiley +1 more source
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley +1 more source
LOKI Low-Latency Open-Source Kyber-Accelerator IPs [PDF]
CRYSTALS-Kyber is a lattice-based key encapsulation mechanism (KEM) recognized as one of the finalist algorithms in NIST’s post-quantum cryptography (PQC) standardization process.
Dolmeta, Alessandra +3 more
core +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source
Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing.
Sang-Yoon Chang, Qaiser Khan
doaj +1 more source
Post-Quantum TLS on Embedded Systems [PDF]
We present our integration of post-quantum cryptography (PQC), more specifically of the post-quantum KEM scheme Kyber for key establishment and the post-quantum signature scheme SPHINCS$^+$, into the embedded TLS library mbed TLS.
Christoph Krauß +3 more
core
Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim +4 more
doaj +1 more source
High-speed Parallel Implementation of Lattice-based Cryptography Based on AVX512 [PDF]
The rapid development of quantum computing seriously threatens the security of widely used public-key cryptography. Lattice-based cryptography occupies an essential position in Post-Quantum Cryptography(PQC) owing to its excellent anti-quantum security ...
Douwei LEI, Debiao HE, Min LUO, Cong PENG
doaj +1 more source

