Quantum cryptography in 5G networks: a comprehensive overview

M Mehic, L Michalek, E Dervisevic… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …

Recent advances in post-quantum cryptography for networks: A survey

E Zeydan, Y Turk, B Aksoy… - … Conference On Mobile …, 2022 - ieeexplore.ieee.org
The development of quantum computers poses a new security threat to network
infrastructures and services, as they will be powerful enough to break the most common …

[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis

M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …

Post-quantum security: Opportunities and challenges

S Li, Y Chen, L Chen, J Liao, C Kuang, K Li, W Liang… - Sensors, 2023 - mdpi.com
Cryptography is very essential in our daily life, not only for confidentiality of information, but
also for information integrity verification, non-repudiation, authentication, and other aspects …

A privacy preserving authentication protocol using quantum computing for V2I authentication in vehicular ad hoc networks

K Prateek, F Altaf, R Amin… - Security and …, 2022 - Wiley Online Library
Many cryptographic techniques have been proposed to conceive a secure and privacy‐
oriented vehicular ad hoc network (VANET) for its practical deployment. The security of …

Post-quantum cryptography: A solution to the challenges of classical encryption algorithms

S Sharma, KR Ramkumar, A Kaur, T Hasija… - … Electronics Devices and …, 2023 - Springer
With the rise in quantum computing, there is an increase in the security concerns of existing
cryptographic algorithms such as Rivest Shamir Adleman (RSA) and advanced encryption …

Blockchain-based voting system powered by post-quantum cryptography (BBVSP-pqc)

S Gupta, KK Gupta, PK Shukla… - … Conference on Power …, 2022 - ieeexplore.ieee.org
Voting is a well-proven method of democratizing human societies and achieving consensus
to avoid any conflicts. The unbiased trusted third parties are involved to conduct and …

[PDF][PDF] Post-quantum cryptography: An introductory overview and implementation challenges of quantum-resistant algorithms

SA Käppler, B Schneider - Proceedings of the Society, 2022 - easychair.org
Cryptographic algorithms are an essential measure to ensure confidentiality and integrity of
internet communication. The development of quantum computers (QCs) and their potential …

Evaluation of performance, energy, and computation costs of quantum-attack resilient encryption algorithms for embedded devices

B Halak, T Gibson, M Henley, CB Botea, B Heath… - IEEE …, 2024 - ieeexplore.ieee.org
The accelerated development of quantum computers poses a direct threat to all current
standards of public key encryption, for example, the Shor algorithm exploits the …

Study on Implementation of Shor's Factorization Algorithm on Quantum Computer

M Kumar, B Mondal - SN Computer Science, 2024 - Springer
The fundamental security aspect of the classical crypto-system depends on integer
factorization and discrete logarithm problems. The quantum factorization problem is a crucial …