Results 71 to 80 of about 3,134 (166)
This paper presents a quantum image encryption method using QLSTM to enhance chaotic sequences and achieve synchronisation control. The approach improves encryption security and reliability, maintaining high information entropy and complexity under attacks.
Yuebo Wu +3 more
wiley +1 more source
On the Performance and Security of Multiplication in GF(2N)
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger +8 more
doaj +1 more source
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley +1 more source
Post-Quantum TLS on Embedded Systems [PDF]
We present our integration of post-quantum cryptography (PQC), more specifically of the post-quantum KEM scheme Kyber for key establishment and the post-quantum signature scheme SPHINCS$^+$, into the embedded TLS library mbed TLS.
Christoph Krauß +3 more
core
Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing.
Sang-Yoon Chang, Qaiser Khan
doaj +1 more source
LOKI Low-Latency Open-Source Kyber-Accelerator IPs [PDF]
CRYSTALS-Kyber is a lattice-based key encapsulation mechanism (KEM) recognized as one of the finalist algorithms in NIST’s post-quantum cryptography (PQC) standardization process.
Dolmeta, Alessandra +3 more
core +1 more source
Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim +4 more
doaj +1 more source
High-speed Parallel Implementation of Lattice-based Cryptography Based on AVX512 [PDF]
The rapid development of quantum computing seriously threatens the security of widely used public-key cryptography. Lattice-based cryptography occupies an essential position in Post-Quantum Cryptography(PQC) owing to its excellent anti-quantum security ...
Douwei LEI, Debiao HE, Min LUO, Cong PENG
doaj +1 more source
Assessment of Cryptographic Approaches for Quantum-Resistant Galileo OSNMA
As time goes on, quantum computing has become more of a reality, bringing several cybersecurity challenges. Modern cryptography is based on the computational complexity of specific mathematical problems; however, as new quantum-based computers are ...
Javier Junquera-Sánchez +3 more
doaj +1 more source
Research on the application of post-quantum cryptographic algorithms in the telecommunications field
As a vital strategic resource, cryptography plays a core role in the field of network and information security. In recent years, the rapid development of quantum computing has effectively promoted the research and application of post-quantum cryptography
WANG Jingran +5 more
doaj

