Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Post-quantum authentication in TLS 1.3: A performance study
D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …
and security research professionals due to their ability to solve (elliptic curve) discrete …
[PDF][PDF] Revolutionizing modern networks: advances in AI, machine learning, and blockchain for quantum satellites and UAV-based communication
Quantum communication is the most secure technique of transmitting data available today.
Fiber communication lines and satellite-to-ground links have served as the basis for the …
Fiber communication lines and satellite-to-ground links have served as the basis for the …
Full post-quantum datagram tls handshake in the internet of things
C McLoughlin, C Gritti, J Samandari - International Conference on Codes …, 2023 - Springer
Quantum computers are a threat to the current standards for secure communication. The
Datagram Transport Layer Security (DTLS) protocol is a common protocol used by Internet …
Datagram Transport Layer Security (DTLS) protocol is a common protocol used by Internet …
Post-quantum cryptography for automotive systems
Automotive systems have become powerful computing platforms with an increasing demand
for secure communication. The hyperconnectivity of the Vehicle-to-Everything (V2X) …
for secure communication. The hyperconnectivity of the Vehicle-to-Everything (V2X) …
[HTML][HTML] Research on secure communication on in-vehicle Ethernet based on post-quantum algorithm NTRUEncrypt
Y Zhu, Y Liu, M Wu, J Li, S Liu, J Zhao - Electronics, 2022 - mdpi.com
In the context of the evolution of in-vehicle electronic and electrical architecture as well as
the rapid development of quantum computers, post-quantum algorithms, such as …
the rapid development of quantum computers, post-quantum algorithms, such as …
Efficient post-quantum TLS handshakes using identity-based key exchange from lattices
Identity-Based Encryption (IBE) is considered an alternative to traditional certificate-based
public key cryptography to reduce communication overheads in wireless sensor networks. In …
public key cryptography to reduce communication overheads in wireless sensor networks. In …
Hybrid OPC UA: enabling post-quantum security for the industrial internet of things
S Paul, E Guerin - 2020 25th IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are considered a crucial part for providing connectivity in
industrial environments. However, the recent increase in connectivity has led to an extended …
industrial environments. However, the recent increase in connectivity has led to an extended …
Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge Applications
The paper examines the complex structure of quan-tum computing and outlines its key
elements, including qubits, quantum gates, superposition, and entanglement. Our inves …
elements, including qubits, quantum gates, superposition, and entanglement. Our inves …