Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The evolution of quantum key distribution networks: On the road to the qinternet
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …
capable of maintaining information-theoretic security. Given the recent advances in QKD …
[HTML][HTML] Futuristic view of the internet of quantum drones: review, challenges and research agenda
The disruptive technology of unmanned aerial vehicles (UAVs), or drones, is a trend with
increasing applications and practical relevance in the current and future society. Despite the …
increasing applications and practical relevance in the current and future society. Despite the …
Single-trace attacks on message encoding in lattice-based KEMs
In this article, we propose single-trace side-channel attacks against lattice-based key
encapsulation mechanisms (KEMs) that are the third-round candidates of the national …
encapsulation mechanisms (KEMs) that are the third-round candidates of the national …
Public blockchains for resource-constrained IoT devices—A state-of-the-art survey
Although blockchain offers a lot of benefits for the Internet-of-Things (IoT) network in terms of
security, there are a number of barriers to its widespread adoption. Since many IoT networks …
security, there are a number of barriers to its widespread adoption. Since many IoT networks …
A blockchain-based containerized edge computing platform for the internet of vehicles
Edge computing is promising to solve the latency issue in the Internet of Vehicles (IoV).
However, due to decentralization, traditional edge computing suffers in management …
However, due to decentralization, traditional edge computing suffers in management …
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Smaug: Pushing lattice-based key encapsulation mechanisms to the limits
Recently, NIST has announced Kyber, a lattice-based key encapsulation mechanism (KEM),
as a post-quantum standard. However, it is not the most efficient scheme among the NIST's …
as a post-quantum standard. However, it is not the most efficient scheme among the NIST's …
TiGER: Tiny bandwidth key encapsulation mechanism for easy miGration based on RLWE (R)
Abstract The quantum resistance Key Encapsulation Mechanism (PQC-KEM) design aims to
replace cryptography in legacy security protocols. It would be nice if PQC-KEM were faster …
replace cryptography in legacy security protocols. It would be nice if PQC-KEM were faster …
FACCT: fast, compact, and constant-time discrete Gaussian sampler over integers
The discrete Gaussian sampler is one of the fundamental tools in implementing lattice-
based cryptosystems. However, a naive discrete Gaussian sampling implementation suffers …
based cryptosystems. However, a naive discrete Gaussian sampling implementation suffers …