Quantum cryptography in 5G networks: a comprehensive overview
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …
VoIP call, instant message or other use of telecommunications systems involves …
Recent advances in post-quantum cryptography for networks: A survey
The development of quantum computers poses a new security threat to network
infrastructures and services, as they will be powerful enough to break the most common …
infrastructures and services, as they will be powerful enough to break the most common …
[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis
M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …
technology and there is a race among countries to get supremacy in quantum technology. It …
Post-quantum security: Opportunities and challenges
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …
also for information integrity verification, non-repudiation, authentication, and other aspects …
A privacy preserving authentication protocol using quantum computing for V2I authentication in vehicular ad hoc networks
Many cryptographic techniques have been proposed to conceive a secure and privacy‐
oriented vehicular ad hoc network (VANET) for its practical deployment. The security of …
oriented vehicular ad hoc network (VANET) for its practical deployment. The security of …
Post-quantum cryptography: A solution to the challenges of classical encryption algorithms
With the rise in quantum computing, there is an increase in the security concerns of existing
cryptographic algorithms such as Rivest Shamir Adleman (RSA) and advanced encryption …
cryptographic algorithms such as Rivest Shamir Adleman (RSA) and advanced encryption …
Blockchain-based voting system powered by post-quantum cryptography (BBVSP-pqc)
Voting is a well-proven method of democratizing human societies and achieving consensus
to avoid any conflicts. The unbiased trusted third parties are involved to conduct and …
to avoid any conflicts. The unbiased trusted third parties are involved to conduct and …
[PDF][PDF] Post-quantum cryptography: An introductory overview and implementation challenges of quantum-resistant algorithms
SA Käppler, B Schneider - Proceedings of the Society, 2022 - easychair.org
Cryptographic algorithms are an essential measure to ensure confidentiality and integrity of
internet communication. The development of quantum computers (QCs) and their potential …
internet communication. The development of quantum computers (QCs) and their potential …
Evaluation of performance, energy, and computation costs of quantum-attack resilient encryption algorithms for embedded devices
B Halak, T Gibson, M Henley, CB Botea, B Heath… - IEEE …, 2024 - ieeexplore.ieee.org
The accelerated development of quantum computers poses a direct threat to all current
standards of public key encryption, for example, the Shor algorithm exploits the …
standards of public key encryption, for example, the Shor algorithm exploits the …
Study on Implementation of Shor's Factorization Algorithm on Quantum Computer
The fundamental security aspect of the classical crypto-system depends on integer
factorization and discrete logarithm problems. The quantum factorization problem is a crucial …
factorization and discrete logarithm problems. The quantum factorization problem is a crucial …