[HTML][HTML] Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition

Y Baseri, V Chouhan, A Ghorbani, A Chow - Computers & Security, 2025 - Elsevier
The rise of large-scale quantum computing poses a significant threat to traditional
cryptographic security measures. Quantum attacks, particularly targeting the mathematical …

Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors

MN Khan, I Khalil, I Ullah, SK Singh, S Dhahbi, H Khan… - Internet of Things, 2024 - Elsevier
Today is the age of superconductivity where each object connects in a cascading manner to
other objects, allowing for seamless integration of real-world objects into the digital domain …

Applying post-quantum cryptography algorithms to a dlt-based cbdc infrastructure: Comparative and feasibility analysis

D de Haro Moraes, JPA Pereira, BE Grossi… - Cryptology ePrint …, 2024 - eprint.iacr.org
This article presents an innovative project for a Central Bank Digital Currency (CBDC)
infrastructure. Focusing on security and reliability, the proposed architecture:(1) employs …

[HTML][HTML] A Multilayer Nonlinear Permutation Framework and Its Demonstration in Lightweight Image Encryption

C İnce, K İnce, D Hanbay - Entropy, 2024 - pmc.ncbi.nlm.nih.gov
As information systems become more widespread, data security becomes increasingly
important. While traditional encryption methods provide effective protection against …

A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography

N Rattanavipanon, J Suaboot, W Werapun - IEEE Access, 2024 - ieeexplore.ieee.org
Quantum computing poses a significant global threat to modern security mechanisms. As
such, security experts and public sectors have issued guidelines to help organizations …

Navigating Through the Unknowns-Organizational Readiness Assessment Model for Quantum-Safe Transition

I Kong, M Janssen, N Bharosa - International Conference on Electronic …, 2024 - Springer
When implementing and adopting new technologies, knowing the level of organizational
readiness is crucial. By assessing the readiness levels, organizations can focus on areas …

Blockchain Security Risk Assessment in Quantum Era, Migration Strategies and Proactive Defense

Y Baseri, A Hafid, Y Shahsavari, D Makrakis… - arxiv preprint arxiv …, 2025 - arxiv.org
The emergence of quantum computing presents a formidable challenge to the security of
blockchain systems. Traditional cryptographic algorithms, foundational to digital signatures …

Error mitigation using quantum neural Q network in secure qutrit distribution on Cleve's protocol on quantum computing

R Palanivel, P Muthulakshmi - Quantum Information Processing, 2024 - Springer
This article explores the critical aspect of error mitigation within quantum systems,
particularly its significance in enabling secure qutrit distribution via Cleve's protocol. Initially …

Quantum Threat in Healthcare IoT: Challenges and Mitigation Strategies

A Alif, KF Hasan, J Laeuchli… - arxiv preprint arxiv …, 2024 - arxiv.org
The Internet of Things (IoT) has transformed healthcare, facilitating remote patient
monitoring, enhanced medication adherence, and chronic disease management. However …

Leveraging Quantum Technology to Enhance Community Services and Supportive ICT Infrastructure

F Phillipson - International Conference on Innovations for Community …, 2024 - Springer
This article explores the transformative potential of quantum technology in community
services, emphasising quantum sensing, quantum computing algorithms, and quantum …