Showing 1 - 20 results of 22 for search '"quantum cryptography"', query time: 0.06s Refine Results
  1. 1

    A Survey of Post-Quantum Cryptography Migration in Vehicles by Nils Lohmiller, Sabrina Kaniewski, Michael Menth, Tobias Heer

    Published 2025-01-01
    Subjects: “…Post-quantum cryptography (PQC)…”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things by Yong Shen, Xiaokang Tang, Xiang Zhang, Yongzhuang Zhou, Hongxin Zou

    Published 2022-11-01
    “…In this article, we present a flexible continuous-wave quantum cryptography scheme for Internet of Things systems. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Improved lattice‐based mix‐nets for electronic voting by Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik

    Published 2023-01-01
    Subjects: “…lattice‐based post‐quantum cryptography…”
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Two-Party Quantum Private Comparison Protocol Based on Rotational Encryption by Min Hou, Yue Wu

    Published 2025-01-01
    Subjects: “…quantum cryptography…”
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT by Oleksiy Shkuratov, Liudmila Antonova, Roman Dzyuba

    Published 2024-12-01
    “…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
    Get full text
    Article
  14. 14

    Perspectives on Entangled Nuclear Particle Pairs Generation and Manipulation in Quantum Communication and Cryptography Systems by Octavian Dănilă, Paul E. Sterian, Andreea Rodica Sterian

    Published 2012-01-01
    “…Entanglement between two quantum elements is a phenomenon which presents a broad application spectrum, being used largely in quantum cryptography schemes and in physical characterisation of the universe. …”
    Get full text
    Article
  15. 15

    Recent progress in the security evaluation of multivariate public‐key cryptography by Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi

    Published 2023-03-01
    “…Abstract Multivariate public‐key cryptography (MPKC) is considered a leading candidate for post‐quantum cryptography (PQC). It is based on the hardness of the multivariate quadratic polynomial (MQ) problem, which is a problem of finding a solution to a system of quadratic equations over a finite field. …”
    Get full text
    Article
  16. 16

    Blockchain-Enabled Zero Trust Architecture for Privacy-Preserving Cybersecurity in IoT Environments by Mohammed A. Aleisa

    Published 2025-01-01
    “…To enable privacy-preserving authentication, access control, and secure communication, the framework integrates blockchain technology with Zero Trust Architecture (ZTA) and post-quantum cryptography. A hybrid Reinforcement-Lattice Blockchain KeyGen for quantum-resilient key generation, Deep Q-Network Multi-Factor Secure Key (DQN-MFSK) for dynamic selection of keys, and Zero-Knowledge Proof for privacy-preserving signatures are employed to achieve secure IoT settings. …”
    Get full text
    Article
  17. 17

    Pioneering the Security of EHRs Using an Immersive Blockchain Conceptual Framework by Rihab Benaich, Youssef Gahi, Saida El Mendili

    Published 2025-02-01
    “…Novelty/Improvement lies in integrating hybrid blockchain, quantum cryptography, AI, and the metaverse into a unified framework, effectively addressing current and future healthcare data management challenges. …”
    Get full text
    Article
  18. 18

    Post quantum proxy signature scheme based on the multivariate public key cryptographic signature by Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen

    Published 2020-04-01
    “…Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. …”
    Get full text
    Article
  19. 19

    Quantum algorithms for enhanced educational technologies by Basil Hanafi, Mohammad Ali, Devyaani Singh

    Published 2025-01-01
    “…Modern quantum algorithms like Grover’s Algorithm and Quantum Annealing support various functionalities like rapidity in processing as well as instantaneous flexibility towards customization of learning resources for the students and proper optimization of the learning trail. Also, quantum cryptography provides reliable security and prevention against future attacks on cyber security hence providing safe means of transferring educational data. …”
    Get full text
    Article
  20. 20

    Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation by Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal

    Published 2025-01-01
    “…Studies are also ongoing on post-quantum cryptography, although they require significant computational resources and are challenging to implement in Internet of Things (IoT) devices. …”
    Get full text
    Article