Results 291 to 300 of about 1,484,925 (333)
Some of the next articles are maybe not open access.
Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
Cybernetics and systems, 2023Classical cryptography is the process of hiding information and it manages the secret knowledge by encrypting the plain text message through the translation of it to an unintelligible message.
Shalini Subramani, Selvi M, K. A, S. Svn
semanticscholar +1 more source
Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations
International Conference on Information Networking, 2023The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms.
Ritik Bavdekar +4 more
semanticscholar +1 more source
IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto +4 more
semanticscholar +1 more source
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto +4 more
semanticscholar +1 more source
An Overview of Quantum-Safe Approaches: Quantum Key Distribution and Post-Quantum Cryptography
Annual Conference on Information Sciences and Systems, 2023Common cryptographic algorithms may no longer be considered secure under future quantum computers, which will cause a serious threat to network security.
Guobin Xu +3 more
semanticscholar +1 more source
High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography
IEEE Symposium on Computer Arithmetic, 2021This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously,
Mojtaba Bisheh-Niasar +2 more
semanticscholar +1 more source
Quantum Cryptography in 5G Networks: A Comprehensive Overview
IEEE Communications Surveys and TutorialsEvery attempt to access to the Internet through a Web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques.
Miralem Mehic +14 more
semanticscholar +1 more source
Analysis of Post-Quantum Cryptography for Internet of Things
International Conference Intelligent Computing and Control Systems, 2022Cryptographic algorithms are crucial for secure communication in the Internet of Things (IoT). Quantum computers threaten public key cryptography algorithms like RSA (Rivest, Shamir, Adleman) and Diffie-Hellman (DH) key exchange schemes, which are widely
Sajimon P C +2 more
semanticscholar +1 more source
Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization
arXiv.orgDue to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems ...
Tao Liu, G. Ramachandran, Raja Jurdak
semanticscholar +1 more source
Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography
International Conference on Network of the FutureThe imminent emergence of quantum computers poses unprecedented challenges to the current cryptographic standards that secure vital digital communications and data worldwide.
Abdullah Aydeger +4 more
semanticscholar +1 more source
Quantum Cryptography: A Pathway to Secure Communication
2022 6th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2022Cryptography was introduced to prevent a third party from accessing and learning the contents of private messages sent during a communication process. Quantum Cryptography looks promising to provide a new level of secure communication by applying quantum
Ishika Giroti, Meenakshi Malhotra
semanticscholar +1 more source

