Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Post-quantum blockchain security for the Internet of Things: Survey and research directions
Blockchain is becoming increasingly popular in the business and academic communities
because it can provide security for a wide range of applications. Therefore, researchers …
because it can provide security for a wide range of applications. Therefore, researchers …
Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
A survey and comparison of post-quantum and quantum blockchains
Blockchains have gained substantial attention from academia and industry for their ability to
facilitate decentralized trust and communications. However, the rapid progress of quantum …
facilitate decentralized trust and communications. However, the rapid progress of quantum …
A comprehensive survey on the implementations, attacks, and countermeasures of the current NIST lightweight cryptography standard
This survey is the first work on the current standard for lightweight cryptography,
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
standardized in 2023. Lightweight cryptography plays a vital role in securing resource …
Quantum attacks on Bitcoin, and how to protect against them
The key cryptographic protocols used to secure the internet and financial transactions of
today are all susceptible to attack by the development of a sufficiently large quantum …
today are all susceptible to attack by the development of a sufficiently large quantum …
Post-quantum authentication in TLS 1.3: A performance study
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …
and security research professionals due to their ability to solve (elliptic curve) discrete …
A hardware accelerator for polynomial multiplication operation of CRYSTALS-KYBER PQC scheme
Polynomial multiplication is one of the most time-consuming operations utilized in lattice-
based post-quantum cryptography (PQC) schemes. CRYSTALS-KYBER is a lattice-based …
based post-quantum cryptography (PQC) schemes. CRYSTALS-KYBER is a lattice-based …
Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography
Quantum computing is an emerging field that uses the concepts of quantum mechanics to
outperform classical computers. Quantum computing finds plethora of applications in the 5G …
outperform classical computers. Quantum computing finds plethora of applications in the 5G …
[HTML][HTML] IoT security challenges: cloud and blockchain, postquantum cryptography, and evolutionary techniques
Internet of Things connects the physical and cybernetic world. As such, security issues of IoT
devices are especially damaging and need to be addressed. In this treatise, we overview …
devices are especially damaging and need to be addressed. In this treatise, we overview …
Efficient lattice-based zero-knowledge arguments with standard soundness: construction and applications
We provide new zero-knowledge argument of knowledge systems that work directly for a
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …
wide class of language, namely, ones involving the satisfiability of matrix-vector relations …