Quantum cryptography in 5G networks: a comprehensive overview

M Mehic, L Michalek, E Dervisevic… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …

Attribute-based encryption in securing big data from post-quantum perspective: a survey

ZB Jemihin, SF Tan, GC Chung - Cryptography, 2022 - mdpi.com
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

Implementing crystals-dilithium signature scheme on fpgas

S Ricci, L Malina, P Jedlicka, D Smékal… - Proceedings of the 16th …, 2021 - dl.acm.org
In July 2020, the lattice-based CRYSTALS-Dilithium digital signature scheme has been
chosen as one of the three third-round finalists in the post-quantum cryptography …

Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution

FR Ghashghaei, Y Ahmed, N Elmrabit, M Yousefi - Computers, 2024 - mdpi.com
This research aims to establish a secure system for key exchange by using post-quantum
cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD) …

Quantumcharge: Post-quantum cryptography for electric vehicle charging

D Kern, C Krauß, T Lauser, N Alnahawi… - … Conference on Applied …, 2023 - Springer
ISO 15118 enables charging and billing of Electric Vehicles (EVs) without user interaction by
using locally installed cryptographic credentials that must be secure over the long lifetime of …

[PDF][PDF] On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.

L Malina, S Ricci, P Dobias, P Jedlicka, J Hajny… - SECRYPT, 2022 - scitepress.org
The importance of designing efficient and secure post-quantum cryptographic algorithms is
reinforced in the recent National Institute of Standards and Technology (NIST)'s Post …

Toward Next Generation Quantum-Safe eIDs and eMRTDs: A Survey

N Alnahawi, N Schmitt, A Wiesmaier… - ACM Transactions on …, 2024 - dl.acm.org
Security mechanisms of Electronic Personal Documents (eCards) depend on (asymmetric)
cryptography that is and always has been subject to the threat of compromise, be it from …

Deploying Post-quantum Algorithms in Existing Applications and Embedded Devices

P Muzikant, J Willemson - International Conference on Ubiquitous …, 2023 - Springer
This document studies the current state of post-quantum cryptography implementation
feasibility, providing general approaches that developers and security engineers can utilize …

On pqc migration and crypto-agility

A Wiesmaier, N Alnahawi, T Grasmeyer… - arxiv preprint arxiv …, 2021 - arxiv.org
Besides the development of PQC algorithms, the actual migration of IT systems to such new
schemes has to be considered, best by utilizing or establishing crypto-agility. Much work in …