Results 81 to 90 of about 2,903 (146)
Post Quantum Cryptography (PQC) Signatures Without Trapdoors
Some of our current public key methods use a trap door to implement digital signature methods. This includes the RSA method, which uses Fermat's little theorem to support the creation and verification of a digital signature. The problem with a back-door is that the actual trap-door method could, in the end, be discovered.
openaire +2 more sources
Challenges and opportunities on the horizon of post-quantum cryptography
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem.
Bharat S. Rawal, Peter J. Curry
doaj +1 more source
Assessment of Cryptographic Approaches for Quantum-Resistant Galileo OSNMA
As time goes on, quantum computing has become more of a reality, bringing several cybersecurity challenges. Modern cryptography is based on the computational complexity of specific mathematical problems; however, as new quantum-based computers are ...
Javier Junquera-Sánchez +3 more
doaj +1 more source
Quantum Key Distribution Protocols for Enhancing Cryptographic Resilience in Next-Generation 5G Network Infrastructures [PDF]
Background: Quantum computing has posed a profound threat to the classical cryptographic systems as it is advancing at an exponential rate with the help of quantum algorithms like Shor’s and Grover’s which can easily decipher the Rivest–Shamir–Adleman ...
Leena Sameer Baddour +4 more
doaj +1 more source
Research on the application of post-quantum cryptographic algorithms in the telecommunications field
As a vital strategic resource, cryptography plays a core role in the field of network and information security. In recent years, the rapid development of quantum computing has effectively promoted the research and application of post-quantum cryptography
WANG Jingran +5 more
doaj
NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj +1 more source
Enhancing the security of public key cryptography in addressing quantum computing threats [PDF]
The potential of quantum computing to compromise traditional public-key cryptography (PKC) has led to a pressing need for more efficient and resilient cryptographic methods.
Brissett, Adrian +5 more
core +1 more source
Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile +6 more
doaj +1 more source
Software Toolkit for HFE-based Multivariate Schemes
In 2017, NIST shook the cryptographic world by starting a process for standardizing post-quantum cryptography. Sixty-four submissions have been considered for the first round of the on-going NIST Post-Quantum Cryptography (PQC) process.
Jean-Charles Faugère +2 more
doaj +1 more source
The proliferation of consumer electronics (CE), from smartphones to IoT-enabled smart devices, has significantly transformed our everyday lives, enhancing convenience and connectivity.
Muhammad Asghar Khan +3 more
doaj +1 more source

