Exploring post-quantum cryptography: Review and directions for the transition process

KC Dekkaki, I Tasic, MD Cano - Technologies, 2024 - search.proquest.com
As quantum computing advances, current cryptographic protocols are increasingly
vulnerable to quantum attacks, particularly those based on Public Key Infrastructure (PKI) …

Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography

A Aydeger, E Zeydan, AK Yadav… - … on Network of the …, 2024 - ieeexplore.ieee.org
The imminent emergence of quantum computers poses unprecedented challenges to the
current cryptographic standards that secure vital digital communications and data …

Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution

N Aquina, S Rommel, IT Monroy - 2024 24th International …, 2024 - ieeexplore.ieee.org
Once a cryptographically relevant quantum computer is built, confidential information that is
communicated today can be decrypted and exposed. Key exchange methods currently used …

Generalized quantum-assisted digital signature service in an SDN-controlled quantum-integrated optical network

A Giorgetti, N Andriolli, M Ferrari, E Storelli… - Journal of Optical …, 2025 - opg.optica.org
Digital signature (DS) is an essential application of cryptography, used to certify the
provenance of a message and its authenticity, guaranteeing the non-repudiation …

Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation

M Iavich, T Kuchukhidze - Cryptography, 2024 - mdpi.com
Significant advancements have been achieved in the field of quantum computing in recent
years. If somebody ever creates a sufficiently strong quantum computer, many of the public …

Quantum Secure Key Management & Delivery Protocol in the QKD framework

M Harmalkar, K Jain, KBA Kumar… - 2024 IEEE 5th India …, 2024 - ieeexplore.ieee.org
The current Quantum Key Distribution (QKD) key delivery API relies on HTTPS for secure
communication. It is vulnerable to quantum computer threats due to its use of public key …

Quantum Based Macorpgraphy System Implementations for Attacks in Data Maintenance

P Kumar, A Pathani, Z Alsalami, KK Dixit… - 2024 4th …, 2024 - ieeexplore.ieee.org
Now securing data in the cloud has become more complicated. In cloud environments, the
data security based on the concept of authentication using cryptographic techniques is …

Implementation of Lattice Theory into the TLS to Ensure Secure Traffic Transmission in IP Networks Based on IP PBX Asterisk.

O Abramkina, M Yakubova, T Serikov… - International …, 2024 - search.ebscohost.com
This paper presents a novel lattice-based cryptography implementation in the Transport
Layer Security (TLS) protocol to enhance the security of traffic transmission in IP networks …

Exploring The Quantum Frontier: Applications, Challenges, and Future Directions In Quantum Communication Technologies

M Shreshtha, D Vimal, S Vikas - … for a Sustainable World (ITU K …, 2024 - ieeexplore.ieee.org
Quantum Communication becomes a new field of communication technologies with highly
diverse applications, and much complexity, and is a promising area deserving further …

Quantum Machine Learning, Leveraging AI, and Semiconductor Technology

U Eswaran, V Eswaran - Integration of AI, Quantum Computing, and …, 2025 - igi-global.com
This chapter explores the intersection of quantum computing, artificial intelligence (AI), and
semiconductor technology, focusing specifically on the emerging field of quantum machine …