Quantum computing: A taxonomy, systematic review and future directions
Quantum computing (QC) is an emerging paradigm with the potential to offer significant
computational advantage over conventional classical computing by exploiting quantum …
computational advantage over conventional classical computing by exploiting quantum …
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
We propose a new bilateral generalization inhomogeneous short integer solution (Bi-GISIS)-
based key exchange protocol with reusable key feature for post-quantum IoT security. It is …
based key exchange protocol with reusable key feature for post-quantum IoT security. It is …
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
The concept of the Internet of Things (IoT) arises due to the change in the characteristics and
numbers of smart devices. Communication of things makes it important to ensure security in …
numbers of smart devices. Communication of things makes it important to ensure security in …
Classification of random number generator applications in IoT: A comprehensive taxonomy
K Seyhan, S Akleylek - Journal of Information Security and Applications, 2022 - Elsevier
Randomness is an important issue for Internet of Things (IoT). The need to generate suitable
random numbers for IoT devices with resource and size limitations has emerged due to the …
random numbers for IoT devices with resource and size limitations has emerged due to the …
Further analysis and improvements of a lattice-based anonymous PAKE scheme
To improve the security of mobile networks in the postquantum era, Dabra et al. recently
proposed a lattice-based anonymous password-authenticated key exchange (LBA-PAKE) …
proposed a lattice-based anonymous password-authenticated key exchange (LBA-PAKE) …
MLWR-2PAKA: a hybrid module learning with rounding-based authenticated key agreement protocol for two-party communication
The two-party authenticated key agreement (2PAKA) protocol allows two users to generate a
shared session key between themselves over a public channel without any assistance from …
shared session key between themselves over a public channel without any assistance from …
[PDF][PDF] A novel IoT-based health and tactical analysis model with fog computing
A Karakaya, S Akleylek - PeerJ Computer Science, 2021 - peerj.com
In sports competitions, depending on the conditions such as excitement, stress, fatigue, etc.
during the match, negative situations such as disability or loss of life may occur for players …
during the match, negative situations such as disability or loss of life may occur for players …
A new password-authenticated module learning with rounding-based key exchange protocol: Saber. PAKE
K Seyhan, S Akleylek - The Journal of Supercomputing, 2023 - Springer
In this paper, a new lattice-based password-authenticated key exchange protocol (PAKE) is
proposed for the post-quantum era. The constructed Saber. PAKE is designed as a PAKE …
proposed for the post-quantum era. The constructed Saber. PAKE is designed as a PAKE …
[PDF][PDF] Security of Public-Key Schemes in the Quantum Computing Era–A Literature Review
B Redkins, I Kuzminykh, B Ghita - IEEE Access, 2023 - researchgate.net
Quantum computers, although still in the theoretical stage, conceptually have the power to
break many current cryptosystems, including public-key schemes, for example, RSA (Rivest …
break many current cryptosystems, including public-key schemes, for example, RSA (Rivest …
A new lattice-based password authenticated key exchange scheme with anonymity and reusable key
K Seyhan, S Akleylek - PeerJ Computer Science, 2024 - peerj.com
In this article, we propose a novel bilateral generalization inhomogenous short integer
solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post …
solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post …