[HTML][HTML] Performance and applicability of post-quantum digital signature algorithms in resource-constrained environments

M Vidaković, K Miličević - Algorithms, 2023 - mdpi.com
The continuous development of quantum computing necessitates the development of
quantum-resistant cryptographic algorithms. In response to this demand, the National …

A Survey on Post-Quantum Cryptography for 5G/6G Communications

R Zhou, H Guo, FEC Teo… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
As quantum computing capabilities accelerate, together with the discovery of Shor's
Algorithm, existing encryption protocols, such as TLS (Transport Layer Security) and IPsec …

Hardware architecture for a quantum computer trusted execution environment

T Trochatos, C Xu, S Deshpande, Y Lu, Y Ding… - arxiv preprint arxiv …, 2023 - arxiv.org
The cloud-based environments in which today's and future quantum computers will operate,
raise concerns about the security and privacy of user's intellectual property. Quantum circuits …

A quantum-safe authentication scheme for IoT devices using homomorphic encryption and weak physical unclonable functions with no helper data

R Román, R Arjona, I Baturone - Internet of Things, 2024 - Elsevier
Abstract Physical Unclonable Functions (PUFs) are widely used to authenticate electronic
devices because they take advantage of random variations in the manufacturing process …

Post-quantum blockchain-based Decentralized identity management for resource sharing in open radio access networks

E Zeydan, L Blanco, J Mangues-Bafalluy… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Blockchain Network (BCN)-based Self-Sovereign Identity (SSI) has recently surfaced as an
identity and access management framework that allows users and organizations to control …

Performance analysis of postquantum cryptographic schemes for securing large-scale wireless sensor networks

J Señor, J Portilla… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Wireless sensor networks aim to collect environmental data for monitoring and decision-
making purposes, often relying on low-power sensor nodes with limited computational …

Running Longer To Slim Down: Post-Quantum Cryptography on Memory-Constrained Devices

AP Fournaris, G Tasopoulos, M Brohet… - … Conference on Omni …, 2023 - ieeexplore.ieee.org
Since we are getting closer to the realisation of a quantum computer capable of breaking the
currently deployed public key cryptosystems, we need to be ready with the next generation …

SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices

M Pursche, N Puch, SN Peters, MP Heinl - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Embedded systems are flexible and cost-effective and thus have found a use case in almost
every part of our daily lives. Due to their widespread use, they have also become valuable …

Instruction Set Extensions for Post-Quantum Cryptography

M Brohet, F Valencia… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Quantum computing is one of the latest break-throughs in the field of computer science,
having the potential of breaking the underlying assumptions of public-key cryptography. With …

Robust Group Authentication Using Quantum Cryptography and Smart Contract for IoMT

R Hireche, H Mansouri, Y Harbi… - … on Information and …, 2024 - ieeexplore.ieee.org
Medical risk management is a critical process within healthcare institutions that involves
identifying, assessing, and mitigating risks to ensure patient safety and improve care quality …