Results 71 to 80 of about 3,134 (166)

Enhancing Quantum Image Encryption With QLSTM and Chaos Synchronisation Control: A Deep Neural Network Approach

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
This paper presents a quantum image encryption method using QLSTM to enhance chaotic sequences and achieve synchronisation control. The approach improves encryption security and reliability, maintaining high information entropy and complexity under attacks.
Yuebo Wu   +3 more
wiley   +1 more source

On the Performance and Security of Multiplication in GF(2N)

open access: yesCryptography, 2018
Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ).
Jean-Luc Danger   +8 more
doaj   +1 more source

Cybersecurity and Artificial Intelligence in Unmanned Aerial Vehicles: Emerging Challenges and Advanced Countermeasures

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The increasing adoption of artificial intelligence (AI)‐driven unmanned aerial vehicles (UAVs) in military, commercial, and surveillance operations has introduced significant security challenges, including cyber threats, adversarial AI attacks, and communication vulnerabilities. This paper presents a comprehensive review of the key security threats and
Deafallah Alsadie, Jiwei Tian
wiley   +1 more source

Post-Quantum TLS on Embedded Systems [PDF]

open access: yes, 2020
We present our integration of post-quantum cryptography (PQC), more specifically of the post-quantum KEM scheme Kyber for key establishment and the post-quantum signature scheme SPHINCS$^+$, into the embedded TLS library mbed TLS.
Christoph Krauß   +3 more
core  

Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions

open access: yesCryptography
Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing.
Sang-Yoon Chang, Qaiser Khan
doaj   +1 more source

LOKI Low-Latency Open-Source Kyber-Accelerator IPs [PDF]

open access: yes
CRYSTALS-Kyber is a lattice-based key encapsulation mechanism (KEM) recognized as one of the finalist algorithms in NIST’s post-quantum cryptography (PQC) standardization process.
Dolmeta, Alessandra   +3 more
core   +1 more source

Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm

open access: yesApplied Sciences
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the ...
Hyunjun Kim   +4 more
doaj   +1 more source

High-speed Parallel Implementation of Lattice-based Cryptography Based on AVX512 [PDF]

open access: yesJisuanji gongcheng
The rapid development of quantum computing seriously threatens the security of widely used public-key cryptography. Lattice-based cryptography occupies an essential position in Post-Quantum Cryptography(PQC) owing to its excellent anti-quantum security ...
Douwei LEI, Debiao HE, Min LUO, Cong PENG
doaj   +1 more source

Assessment of Cryptographic Approaches for Quantum-Resistant Galileo OSNMA

open access: yesNavigation
As time goes on, quantum computing has become more of a reality, bringing several cybersecurity challenges. Modern cryptography is based on the computational complexity of specific mathematical problems; however, as new quantum-based computers are ...
Javier Junquera-Sánchez   +3 more
doaj   +1 more source

Research on the application of post-quantum cryptographic algorithms in the telecommunications field

open access: yesDianxin kexue
As a vital strategic resource, cryptography plays a core role in the field of network and information security. In recent years, the rapid development of quantum computing has effectively promoted the research and application of post-quantum cryptography
WANG Jingran   +5 more
doaj  

Home - About - Disclaimer - Privacy