Results 81 to 90 of about 3,134 (166)

Quantum Key Distribution Protocols for Enhancing Cryptographic Resilience in Next-Generation 5G Network Infrastructures [PDF]

open access: yesIranian Journal of Information Processing & Management
Background: Quantum computing has posed a profound threat to the classical cryptographic systems as it is advancing at an exponential rate with the help of quantum algorithms like Shor’s and Grover’s which can easily decipher the Rivest–Shamir–Adleman ...
Leena Sameer Baddour   +4 more
doaj   +1 more source

Challenges and opportunities on the horizon of post-quantum cryptography

open access: yesAPL Quantum
Large quantum computers have the potential to break many cryptographic systems, e.g., Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve cryptosystem.
Bharat S. Rawal, Peter J. Curry
doaj   +1 more source

NeonCROSS: Vectorized Implementation of Post-Quantum Signature CROSS on Cortex-A72 and Apple M3

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
The advancement of quantum computing threatens traditional public-key cryptographic systems, prompting the development of post-quantum cryptography (PQC).
Hanyu Wei, Wenqian Li, Yunlei Zhao
doaj   +1 more source

Enabling Quantum-Resistant EDHOC: Design and Performance Evaluation

open access: yesIEEE Access
The Ephemeral Diffie-Hellman over COSE (EDHOC) is a compact and lightweight key establishment protocol for constrained scenarios that provides end-to-end application layer security context.
Lidia Pocero Fraile   +6 more
doaj   +1 more source

Software Toolkit for HFE-based Multivariate Schemes

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
In 2017, NIST shook the cryptographic world by starting a process for standardizing post-quantum cryptography. Sixty-four submissions have been considered for the first round of the on-going NIST Post-Quantum Cryptography (PQC) process.
Jean-Charles Faugère   +2 more
doaj   +1 more source

Enhancing the security of public key cryptography in addressing quantum computing threats [PDF]

open access: yes
The potential of quantum computing to compromise traditional public-key cryptography (PKC) has led to a pressing need for more efficient and resilient cryptographic methods.
Brissett, Adrian   +5 more
core   +1 more source

Algorithmic Security is Insufficient: A Comprehensive Survey on Implementation Attacks Haunting Post-Quantum Security

open access: yes, 2023
This survey is on forward-looking, emerging security concerns in post-quantum era, i.e., the implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) competition and thus the visions, insights, and discussions can be used as a step
Azarderakhsh, Reza   +3 more
core  

PQ-LEACH: A novel post-quantum protocol for securing WSNs communication

open access: yesInternational Journal of Engineering Business Management
Ensuring the confidentiality of communication is of paramount significance. Traditionally, cryptographic practices for Wireless Sensor Networks (WSN) have been primarily based on classical cryptography like RSA and Elliptic Curve, which are potentially ...
Shaykhah S Aldosari, Layla S Aldawsari
doaj   +1 more source

Unveiling Samsung Quantum Galaxy: Securing Smartphones With Quantum and Post-Quantum Cryptography

open access: yesIEEE Access
Quantum technologies have emerged as vital tools for enhancing mobile communication security. The Samsung Galaxy series now features a quantum random number generator (QRNG) that offers true randomness, strengthening cryptographic protection. Despite its
Omar Alibrahim
doaj   +1 more source

Implementation and performance of post-quantum cryptography for resource constrained consumer electronics

open access: yesDiscover Internet of Things
The proliferation of consumer electronics (CE), from smartphones to IoT-enabled smart devices, has significantly transformed our everyday lives, enhancing convenience and connectivity.
Muhammad Asghar Khan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy