Results 81 to 90 of about 2,903 (146)

Post Quantum Cryptography (PQC) Signatures Without Trapdoors

open access: yes
Some of our current public key methods use a trap door to implement digital signature methods. This includes the RSA method, which uses Fermat's little theorem to support the creation and verification of a digital signature. The problem with a back-door is that the actual trap-door method could, in the end, be discovered.
openaire   +2 more sources

Challenges and opportunities on the horizon of post-quantum cryptography

open access: yesAPL Quantum
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem.
Bharat S. Rawal, Peter J. Curry
doaj   +1 more source

Assessment of Cryptographic Approaches for Quantum-Resistant Galileo OSNMA

open access: yesNavigation
As time goes on, quantum computing has become more of a reality, bringing several cybersecurity challenges. Modern cryptography is based on the computational complexity of specific mathematical problems; however, as new quantum-based computers are ...
Javier Junquera-Sánchez   +3 more
doaj   +1 more source

Quantum Key Distribution Protocols for Enhancing Cryptographic Resilience in Next-Generation 5G Network Infrastructures [PDF]

open access: yesIranian Journal of Information Processing & Management
Background: Quantum computing has posed a profound threat to the classical cryptographic systems as it is advancing at an exponential rate with the help of quantum algorithms like Shor’s and Grover’s which can easily decipher the Rivest–Shamir–Adleman ...
Leena Sameer Baddour   +4 more
doaj   +1 more source

Research on the application of post-quantum cryptographic algorithms in the telecommunications field

open access: yesDianxin kexue
As a vital strategic resource, cryptography plays a core role in the field of network and information security. In recent years, the rapid development of quantum computing has effectively promoted the research and application of post-quantum cryptography
WANG Jingran   +5 more
doaj  

NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj   +1 more source

Enhancing the security of public key cryptography in addressing quantum computing threats [PDF]

open access: yes
The potential of quantum computing to compromise traditional public-key cryptography (PKC) has led to a pressing need for more efficient and resilient cryptographic methods.
Brissett, Adrian   +5 more
core   +1 more source

Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation

open access: yesIEEE Access
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile   +6 more
doaj   +1 more source

Software Toolkit for HFE-based Multivariate Schemes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
In 2017, NIST shook the cryptographic world by starting a process for standardizing post-quantum cryptography. Sixty-four submissions have been considered for the first round of the on-going NIST Post-Quantum Cryptography (PQC) process.
Jean-Charles Faugère   +2 more
doaj   +1 more source

Implementation and performance of post-quantum cryptography for resource constrained consumer electronics

open access: yesDiscover Internet of Things
The proliferation of consumer electronics (CE), from smartphones to IoT-enabled smart devices, has significantly transformed our everyday lives, enhancing convenience and connectivity.
Muhammad Asghar Khan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy