-
1
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01Subjects: “…Post-quantum cryptography (PQC)…”
Get full text
Article -
2
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01Get full text
Article -
3
Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming
Published 2025-01-01Get full text
Article -
4
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…In this article, we present a flexible continuous-wave quantum cryptography scheme for Internet of Things systems. …”
Get full text
Article -
5
Analysis of the amplitude form of the quantum hash function
Published 2023-11-01Subjects: “…quantum cryptography…”
Get full text
Article -
6
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01Subjects: Get full text
Article -
7
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01Subjects: “…lattice‐based post‐quantum cryptography…”
Get full text
Article -
8
qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era
Published 2025-01-01Subjects: Get full text
Article -
9
A novel method for developing post-quantum cryptoschemes and a practical signature algorithm
Published 2025-01-01Subjects: Get full text
Article -
10
Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
11
Coexistence Demonstration and Wavelength Dependency Analysis of S-Band CV-QKD Signal with Fully Loaded C+L-Band DWDM Signals
Published 2025-01-01Subjects: “…quantum cryptography…”
Get full text
Article -
12
Quantum Private Comparison Protocol with Cluster States
Published 2025-01-01Subjects: Get full text
Article -
13
INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT
Published 2024-12-01“…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
Get full text
Article -
14
Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems
Published 2012-01-01“…Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. …”
Get full text
Article -
15
Recent progress in the security evaluation of multivariate public‐key cryptography
Published 2023-03-01“…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field. …”
Get full text
Article -
16
Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments
Published 2025-01-01“…To enable privacy-preserving authentication, access control, and secure communication, the framework integrates blockchain technology with Zero Trust Architecture (ZTA) and post-quantum cryptography. A hybrid Reinforcement-Lattice Blockchain KeyGen for quantum-resilient key generation, Deep Q-Network Multi-Factor Secure Key (DQN-MFSK) for dynamic selection of keys, and Zero-Knowledge Proof for privacy-preserving signatures are employed to achieve secure IoT settings. …”
Get full text
Article -
17
Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework
Published 2025-02-01“…Novelty/Improvement lies in integrating hybrid blockchain, quantum cryptography, AI, and the metaverse into a unified framework, effectively addressing current and future healthcare data management challenges. …”
Get full text
Article -
18
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01“…Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. …”
Get full text
Article -
19
Quantum algorithms for enhanced educational technologies
Published 2025-01-01“…Modern quantum algorithms like Grover’s Algorithm and Quantum Annealing support various functionalities like rapidity in processing as well as instantaneous flexibility towards customization of learning resources for the students and proper optimization of the learning trail. Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
Get full text
Article -
20
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01“…Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. …”
Get full text
Article