Envisioning the future of cyber security in post-quantum era: A survey on pq standardization, applications, challenges and opportunities
The rise of quantum computers exposes vulnerabilities in current public key cryptographic
protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we …
protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we …
Performance characterization of post-quantum digital certificates
Public Key Infrastructure (PKI) generates and distributes digital certificates to provide the
root of trust for securing digital networking systems. To continue securing digital networking …
root of trust for securing digital networking systems. To continue securing digital networking …
Advancing the Security of LDACS
The “Single European Sky” air traffic management master plan foresees the introduction of
several modern digital data links for aeronautical communications. The candidate for long …
several modern digital data links for aeronautical communications. The candidate for long …
[HTML][HTML] Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
Recent developments in quantum computing have shed light on the shortcomings of the
conventional public cryptosystem. Even while Shor's algorithm cannot yet be implemented …
conventional public cryptosystem. Even while Shor's algorithm cannot yet be implemented …
Hybrid post-quantum signatures in hardware security keys
D Ghinea, F Kaczmarczyck, J Pullman, J Cretin… - … Conference on Applied …, 2023 - Springer
Recent advances in quantum computing are increasingly jeopardizing the security of
cryptosystems currently in widespread use, such as RSA or elliptic-curve signatures. To …
cryptosystems currently in widespread use, such as RSA or elliptic-curve signatures. To …
Post-quantum cryptography in use: Empirical analysis of the tls handshake performance
R Döring, M Geitz - NOMS 2022-2022 IEEE/IFIP Network …, 2022 - ieeexplore.ieee.org
With the increasing speed in the development of quantum computers, secure
communication is at risk. A promising candidate to replace existing cryptographic patterns …
communication is at risk. A promising candidate to replace existing cryptographic patterns …
A secure cell-attachment procedure of LDACS
N Mäurer, T Gräupl, C Gentsch… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
In Europe the Single European Sky air traffic management master plan foresees the
introduction of several modern digital data links for aeronautical communications. The …
introduction of several modern digital data links for aeronautical communications. The …
Quic protocol with post-quantum authentication
Post-quantum ciphers (PQC) are designed to replace the current public-key ciphers which
are vulnerable against the quantum-equipped adversaries, eg, RSA. We study the …
are vulnerable against the quantum-equipped adversaries, eg, RSA. We study the …
[HTML][HTML] Post quantum blockchain architecture for internet of things over NTRU lattice
B Yuan, F Wu, Z Zheng - Plos one, 2023 - journals.plos.org
The Internet of Things (IoT) and blockchain, the hottest frontier technologies in recent years,
are expected to lead the next technological revolution. Blockchain promises to solve the …
are expected to lead the next technological revolution. Blockchain promises to solve the …
[HTML][HTML] Analytic review of healthcare software by using quantum computing security techniques
The core objective of this security research is to ensure that healthcare software (HS) is
secure when operating on a fully functional quantum computer. Developers are constantly …
secure when operating on a fully functional quantum computer. Developers are constantly …