Envisioning the future of cyber security in post-quantum era: A survey on pq standardization, applications, challenges and opportunities

S Darzi, K Ahmadi, S Aghapour, AA Yavuz… - arXiv preprint arXiv …, 2023 - arxiv.org
The rise of quantum computers exposes vulnerabilities in current public key cryptographic
protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we …

Performance characterization of post-quantum digital certificates

M Raavi, P Chandramouli, S Wuthier… - 2021 International …, 2021 - ieeexplore.ieee.org
Public Key Infrastructure (PKI) generates and distributes digital certificates to provide the
root of trust for securing digital networking systems. To continue securing digital networking …

Advancing the Security of LDACS

N Mäurer, T Gräupl, C Schmitt… - … on Network and …, 2022 - ieeexplore.ieee.org
The “Single European Sky” air traffic management master plan foresees the introduction of
several modern digital data links for aeronautical communications. The candidate for long …

[HTML][HTML] Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms

S Farooq, A Altaf, F Iqbal, EB Thompson, DLR Vargas… - Sensors, 2023 - mdpi.com
Recent developments in quantum computing have shed light on the shortcomings of the
conventional public cryptosystem. Even while Shor's algorithm cannot yet be implemented …

Hybrid post-quantum signatures in hardware security keys

D Ghinea, F Kaczmarczyck, J Pullman, J Cretin… - … Conference on Applied …, 2023 - Springer
Recent advances in quantum computing are increasingly jeopardizing the security of
cryptosystems currently in widespread use, such as RSA or elliptic-curve signatures. To …

Post-quantum cryptography in use: Empirical analysis of the tls handshake performance

R Döring, M Geitz - NOMS 2022-2022 IEEE/IFIP Network …, 2022 - ieeexplore.ieee.org
With the increasing speed in the development of quantum computers, secure
communication is at risk. A promising candidate to replace existing cryptographic patterns …

A secure cell-attachment procedure of LDACS

N Mäurer, T Gräupl, C Gentsch… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
In Europe the Single European Sky air traffic management master plan foresees the
introduction of several modern digital data links for aeronautical communications. The …

Quic protocol with post-quantum authentication

M Raavi, S Wuthier, P Chandramouli, X Zhou… - … on Information Security, 2022 - Springer
Post-quantum ciphers (PQC) are designed to replace the current public-key ciphers which
are vulnerable against the quantum-equipped adversaries, eg, RSA. We study the …

[HTML][HTML] Post quantum blockchain architecture for internet of things over NTRU lattice

B Yuan, F Wu, Z Zheng - Plos one, 2023 - journals.plos.org
The Internet of Things (IoT) and blockchain, the hottest frontier technologies in recent years,
are expected to lead the next technological revolution. Blockchain promises to solve the …

[HTML][HTML] Analytic review of healthcare software by using quantum computing security techniques

SH Almotiri, M Nadeem, MA Al Ghamdi… - International Journal of …, 2023 - ijfis.org
The core objective of this security research is to ensure that healthcare software (HS) is
secure when operating on a fully functional quantum computer. Developers are constantly …