Post-quantum cryptography for internet of things: a survey on performance and optimization

T Liu, G Ramachandran, R Jurdak - arXiv preprint arXiv:2401.17538, 2024 - arxiv.org
Due to recent development in quantum computing, the invention of a large quantum
computer is no longer a distant future. Quantum computing severely threatens modern …

Evaluation of performance, energy, and computation costs of quantum-attack resilient encryption algorithms for embedded devices

B Halak, T Gibson, M Henley, CB Botea, B Heath… - IEEE …, 2024 - ieeexplore.ieee.org
The accelerated development of quantum computers poses a direct threat to all current
standards of public key encryption, for example, the Shor algorithm exploits the …

On the Security and Peer Tracking of Permissionless Blockchain Peer-to-Peer Networks

S Wuthier - 2024 - search.proquest.com
Peer-to-peer blockchain networks provide a unique infrastructure for processing
transactions and achieving consensus among diverse participants, ensuring the robustness …

Enabling Post-Quantum Cryptography for Secure Internet Networking: Performance, Feasibility Analyses, and Solutions

M Raavi - 2023 - search.proquest.com
Cryptography is the core building block in providing security to digital communications and
enabling secure internet networking. The security of cryptographic algorithms relies on the …