Results 81 to 90 of about 3,134 (166)
Quantum Key Distribution Protocols for Enhancing Cryptographic Resilience in Next-Generation 5G Network Infrastructures [PDF]
Background: Quantum computing has posed a profound threat to the classical cryptographic systems as it is advancing at an exponential rate with the help of quantum algorithms like Shor’s and Grover’s which can easily decipher the Rivest–Shamir–Adleman ...
Leena Sameer Baddour +4 more
doaj +1 more source
Challenges and opportunities on the horizon of post-quantum cryptography
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem.
Bharat S. Rawal, Peter J. Curry
doaj +1 more source
NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj +1 more source
Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile +6 more
doaj +1 more source
Software Toolkit for HFE-based Multivariate Schemes
In 2017, NIST shook the cryptographic world by starting a process for standardizing post-quantum cryptography. Sixty-four submissions have been considered for the first round of the on-going NIST Post-Quantum Cryptography (PQC) process.
Jean-Charles Faugère +2 more
doaj +1 more source
Enhancing the security of public key cryptography in addressing quantum computing threats [PDF]
The potential of quantum computing to compromise traditional public-key cryptography (PKC) has led to a pressing need for more efficient and resilient cryptographic methods.
Brissett, Adrian +5 more
core +1 more source
This survey is on forward-looking, emerging security concerns in post-quantum era, i.e., the implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) competition and thus the visions, insights, and discussions can be used as a step
Azarderakhsh, Reza +3 more
core
PQ-LEACH: A novel post-quantum protocol for securing WSNs communication
Ensuring the confidentiality of communication is of paramount significance. Traditionally, cryptographic practices for Wireless Sensor Networks (WSN) have been primarily based on classical cryptography like RSA and Elliptic Curve, which are potentially ...
Shaykhah S Aldosari, Layla S Aldawsari
doaj +1 more source
Unveiling Samsung Quantum Galaxy: Securing Smartphones With Quantum and Post-Quantum Cryptography
Quantum technologies have emerged as vital tools for enhancing mobile communication security. The Samsung Galaxy series now features a quantum random number generator (QRNG) that offers true randomness, strengthening cryptographic protection. Despite its
Omar Alibrahim
doaj +1 more source
The proliferation of consumer electronics (CE), from smartphones to IoT-enabled smart devices, has significantly transformed our everyday lives, enhancing convenience and connectivity.
Muhammad Asghar Khan +3 more
doaj +1 more source

