Quantum cryptography in 5G networks: a comprehensive overview
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …
VoIP call, instant message or other use of telecommunications systems involves …
Attribute-based encryption in securing big data from post-quantum perspective: a survey
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …
Post-quantum era privacy protection for intelligent infrastructures
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …
Implementing crystals-dilithium signature scheme on fpgas
In July 2020, the lattice-based CRYSTALS-Dilithium digital signature scheme has been
chosen as one of the three third-round finalists in the post-quantum cryptography …
chosen as one of the three third-round finalists in the post-quantum cryptography …
Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution
This research aims to establish a secure system for key exchange by using post-quantum
cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD) …
cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD) …
Quantumcharge: Post-quantum cryptography for electric vehicle charging
ISO 15118 enables charging and billing of Electric Vehicles (EVs) without user interaction by
using locally installed cryptographic credentials that must be secure over the long lifetime of …
using locally installed cryptographic credentials that must be secure over the long lifetime of …
[PDF][PDF] On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
The importance of designing efficient and secure post-quantum cryptographic algorithms is
reinforced in the recent National Institute of Standards and Technology (NIST)'s Post …
reinforced in the recent National Institute of Standards and Technology (NIST)'s Post …
Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey
Security mechanisms of Electronic Personal Documents (eCards) depend on (asymmetric)
cryptography that is and always has been subject to the threat of compromise, be it from …
cryptography that is and always has been subject to the threat of compromise, be it from …
Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices
This document studies the current state of post-quantum cryptography implementation
feasibility, providing general approaches that developers and security engineers can utilize …
feasibility, providing general approaches that developers and security engineers can utilize …
On pqc migration and crypto-agility
Besides the development of PQC algorithms, the actual migration of IT systems to such new
schemes has to be considered, best by utilizing or establishing crypto-agility. Much work in …
schemes has to be considered, best by utilizing or establishing crypto-agility. Much work in …