Post-quantum blockchain security for the Internet of Things: Survey and research directions

H Gharavi, J Granjal, E Monteiro - … Communications Surveys & …, 2024‏ - ieeexplore.ieee.org
Blockchain is becoming increasingly popular in the business and academic communities
because it can provide security for a wide range of applications. Therefore, researchers …

Post-quantum lattice-based cryptography implementations: A survey

H Nejatollahi, N Dutt, S Ray, F Regazzoni… - ACM Computing …, 2019‏ - dl.acm.org
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …

A survey and comparison of post-quantum and quantum blockchains

Z Yang, H Alfauri, B Farkiani, R Jain… - … Surveys & Tutorials, 2023‏ - ieeexplore.ieee.org
Blockchains have gained substantial attention from academia and industry for their ability to
facilitate decentralized trust and communications. However, the rapid progress of quantum …

A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard

J Kaur, AC Canto, MM Kermani… - arxiv preprint arxiv …, 2023‏ - arxiv.org
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …

Quantum attacks on Bitcoin, and how to protect against them

D Aggarwal, GK Brennen, T Lee, M Santha… - arxiv preprint arxiv …, 2017‏ - arxiv.org
The key cryptographic protocols used to secure the internet and financial transactions of
today are all susceptible to attack by the development of a sufficiently large quantum …

Post-quantum authentication in TLS 1.3: A performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020‏ - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

A hardware accelerator for polynomial multiplication operation of CRYSTALS-KYBER PQC scheme

F Yaman, AC Mert, E Öztürk… - 2021 Design, Automation …, 2021‏ - ieeexplore.ieee.org
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-
based post-quantum cryptography (PQC) schemes. CRYSTALS-KYBER is a lattice-based …

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

V Chamola, A Jolfaei, V Chanana, P Parashari… - Computer …, 2021‏ - Elsevier
Quantum computing is an emerging field that uses the concepts of quantum mechanics to
outperform classical computers. Quantum computing finds plethora of applications in the 5G …

[HTML][HTML] IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques

S Balogh, O Gallo, R Ploszek, P Špaček, P Zajac - Electronics, 2021‏ - mdpi.com
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …

Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications

R Yang, MH Au, Z Zhang, Q Xu, Z Yu… - Annual International …, 2019‏ - Springer
We provide new zero-knowledge argument of knowledge systems that work directly for a
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …