[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis

M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …

Quantum NETwork: from theory to practice

K Fang, J Zhao, X Li, Y Li, R Duan - Science China Information Sciences, 2023 - Springer
The quantum internet is envisioned as the ultimate stage of the quantum revolution, which
surpasses its classical counterpart in various aspects, such as the efficiency of data …

Hardware architecture for a quantum computer trusted execution environment

T Trochatos, C Xu, S Deshpande, Y Lu, Y Ding… - arxiv preprint arxiv …, 2023 - arxiv.org
The cloud-based environments in which today's and future quantum computers will operate,
raise concerns about the security and privacy of user's intellectual property. Quantum circuits …

[HTML][HTML] AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security

M Al-Khalidi, R Al-Zaidi, T Ali, S Khan, AK Bashir - Ad Hoc Networks, 2025 - Elsevier
The proliferation of sensory applications has led to the development of the Internet of Things
(IoT), which extends connectivity beyond traditional computing platforms and connects all …

Towards Quantum-Safe Federated Learning via Homomorphic Encryption: Learning with Gradients

G Yan, S Lyu, H Hou, Z Zheng, L Song - arxiv preprint arxiv:2402.01154, 2024 - arxiv.org
This paper introduces a privacy-preserving distributed learning framework via private-key
homomorphic encryption. Thanks to the randomness of the quantization of gradients, our …

The Role of Blockchain in Finance Beyond Cryptocurrency: Trust, Data Management, and Automation

H Chen, N Wei, L Wang, W Mubarak, MA Albahar… - IEEE …, 2024 - ieeexplore.ieee.org
Blockchain has been a vibrant technology in the past decade, with a wide variety of
applications across different industrial sectors. The concept of blockchain has been widely …

Exact calculation of quantizer constants for arbitrary lattices

D Pook-Kolb, B Allen, E Agrell - arxiv preprint arxiv:2211.01987, 2022 - arxiv.org
We present an algorithm for the exact computer-aided construction of the Voronoi cells of
lattices with known symmetry group. Our algorithm scales better than linearly with the total …

Graphic lattices made by graph felicitous-type labelings and colorings of topological coding

X Zhang, S Zhang, C Ye, B Yao - Discrete Applied Mathematics, 2023 - Elsevier
With the rapid development of quantum computing theory and quantum computer
technology, the traditional public-key cryptographic algorithms face great challenges. A …

Towards Quantum-Safe Distributed Learning via Homomorphic Encryption: Learning with Gradients

G Yan, S Lyu, H Hou, Z Zheng… - 2024 IEEE Information …, 2024 - ieeexplore.ieee.org
This paper introduces a privacy-preserving distributed learning framework via private-key
homomorphic encryption. Using randomness in the quantization of gradients, our encryption …

Post-quantum blockchain for internet of things domain

B Yokubov - 2023 - bura.brunel.ac.uk
In the evolving realm of quantum computing, emerging advancements reveal substantial
challenges and threats to existing cryptographic infrastructures, particularly impacting …