Results 291 to 300 of about 1,484,925 (333)
Some of the next articles are maybe not open access.

Review of Security Methods Based on Classical Cryptography and Quantum Cryptography

Cybernetics and systems, 2023
Classical cryptography is the process of hiding information and it manages the secret knowledge by encrypting the plain text message through the translation of it to an unintelligible message.
Shalini Subramani, Selvi M, K. A, S. Svn
semanticscholar   +1 more source

Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations

International Conference on Information Networking, 2023
The development of large quantum computers will have dire consequences for cryptography. Most of the symmetric and asymmetric cryptographic algorithms are vulnerable to quantum algorithms.
Ritik Bavdekar   +4 more
semanticscholar   +1 more source

Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography

IEEE Transactions on Emerging Topics in Computing, 2023
Advances in quantum computing have brought the need for developing public-key cryptosystems secure against attacks potentially enabled by quantum computers.
Alvaro Cintas Canto   +4 more
semanticscholar   +1 more source

An Overview of Quantum-Safe Approaches: Quantum Key Distribution and Post-Quantum Cryptography

Annual Conference on Information Sciences and Systems, 2023
Common cryptographic algorithms may no longer be considered secure under future quantum computers, which will cause a serious threat to network security.
Guobin Xu   +3 more
semanticscholar   +1 more source

High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography

IEEE Symposium on Computer Arithmetic, 2021
This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously,
Mojtaba Bisheh-Niasar   +2 more
semanticscholar   +1 more source

Quantum Cryptography in 5G Networks: A Comprehensive Overview

IEEE Communications Surveys and Tutorials
Every attempt to access to the Internet through a Web browser, email sent, VPN connection, VoIP call, instant message or other use of telecommunications systems involves cryptographic techniques.
Miralem Mehic   +14 more
semanticscholar   +1 more source

Analysis of Post-Quantum Cryptography for Internet of Things

International Conference Intelligent Computing and Control Systems, 2022
Cryptographic algorithms are crucial for secure communication in the Internet of Things (IoT). Quantum computers threaten public key cryptography algorithms like RSA (Rivest, Shamir, Adleman) and Diffie-Hellman (DH) key exchange schemes, which are widely
Sajimon P C   +2 more
semanticscholar   +1 more source

Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization

arXiv.org
Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems ...
Tao Liu, G. Ramachandran, Raja Jurdak
semanticscholar   +1 more source

Towards a Quantum-Resilient Future: Strategies for Transitioning to Post-Quantum Cryptography

International Conference on Network of the Future
The imminent emergence of quantum computers poses unprecedented challenges to the current cryptographic standards that secure vital digital communications and data worldwide.
Abdullah Aydeger   +4 more
semanticscholar   +1 more source

Quantum Cryptography: A Pathway to Secure Communication

2022 6th International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2022
Cryptography was introduced to prevent a third party from accessing and learning the contents of private messages sent during a communication process. Quantum Cryptography looks promising to provide a new level of secure communication by applying quantum
Ishika Giroti, Meenakshi Malhotra
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy