To see the other types of publications on this topic, follow the link: Post-quantum security.

Journal articles on the topic 'Post-quantum security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Post-quantum security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

V M, Thafzy, and Dr Nikesh P. "A Comparative Study of Hybrid Cryptographic Systems: Integrating Classical and Post-Quantum Cryptographic Techniques for Comprehensive Post-Quantum Security." International Journal of Research Publication and Reviews 6, no. 3 (2025): 962–70. https://doi.org/10.55248/gengpi.6.0325.1128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ranjita and Gautam Kumar Rajput Dr. "Cryptanalysis of pre-quantum and post-quantum cryptography." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 650–54. https://doi.org/10.5281/zenodo.13643131.

Full text
Abstract:
Cryptanalysis, the study of analyzing and breaking cryptographic algorithms, has long been a crucial aspect of securing digital communications. As quantum computing approaches practical implementation, the cryptographic landscape is poised for significant transformation. This paper delves into the cryptanalysis of both pre-quantum and post-quantum cryptographic systems, highlighting the vulnerabilities and strengths of various algorithms in the face of evolving threats. Pre-quantum cryptography, which includes widely used systems like RSA and Elliptic Curve Cryptography (ECC), is based on math
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Silong, Yuxiang Chen, Lin Chen, et al. "Post-Quantum Security: Opportunities and Challenges." Sensors 23, no. 21 (2023): 8744. http://dx.doi.org/10.3390/s23218744.

Full text
Abstract:
Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among the methods currently developed, quantum key distribution is a technology that uses t
APA, Harvard, Vancouver, ISO, and other styles
4

Abdulwahhab, Saba Alaa, Qasim Mohammed Hussien, and Imad Fakhri Al-Shaikhli. "An overview of number theory research unit variant development security." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1164–73. https://doi.org/10.11591/ijeecs.v28.i2.pp1164-1173.

Full text
Abstract:
Number theory research unit (NTRU) become the most important of security in recent, with its modification of their variant, this paper search of the literature and A number of studies have examined the in public key variant development and security. In general, prior work is limited to a subset of public key increasing complexity but the benefits of speed up encryption/ decryption have not been fully established. So this paper will be the basis for those who want to develop and find proposed solutions for new studies of the NTRU algorithm. This paper aims to develop a framework to investigate
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yiheng. "Quantum Security: An Overview of Quantum Cryptography." Theoretical and Natural Science 109, no. 1 (2025): 73–78. https://doi.org/10.54254/2753-8818/2025.gl23411.

Full text
Abstract:
Recent years have witnessed a furious race for quantum technologies in both academia and industry, driven by the rapid progress in quantum cryptography. The traditional cryptography faces the risk of being deciphered. Thus, traditional ways of transmitting information are not safe anymore. For those reasons, future information transmission needs to use quantum cryptography. This paper explores the two most important ways to achieve quantum security: Quantum Key Distribution and Post Quantum Cryptography. This study also investigates the synergistic integration of these two methodologies within
APA, Harvard, Vancouver, ISO, and other styles
6

Müller, Johannes, and Jan Oupický. "Post-quantum XML and SAML Single Sign-On." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.

Full text
Abstract:
Extensible Markup Language (XML) is one of the most popular serialization languages. Since many security protocols are built using XML, it also provides cryptographic functionality. A central framework in this area is the Security Assertion Markup Language (SAML). This standard is one of the most widely used options for implementing Single Sign-On (SSO), which allows users to authenticate to different service providers using the credentials from a single identity provider. Like all other security protocols currently in use, the security and privacy of XML-based frameworks such as SAML is threa
APA, Harvard, Vancouver, ISO, and other styles
7

Sedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.

Full text
Abstract:
This study provides a comprehensive review of quantum cryptography and its implications for U.S. national security in the face of emerging quantum technologies. The primary objective is to investigate the potential of quantum cryptographic methods in creating unbreakable encryption and their future role in enhancing digital security. Employing a systematic literature review and content analysis, the study draws on recent peer-reviewed articles, institutional reports, and academic journals from 2013 to 2023. The methodology focuses on evaluating the evolution, current state, and challenges of q
APA, Harvard, Vancouver, ISO, and other styles
8

Cultice, Tyler, and Himanshu Thapliyal. "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security." Information 13, no. 8 (2022): 382. http://dx.doi.org/10.3390/info13080382.

Full text
Abstract:
The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsystems. As vehicles can have lifespans of multiple decades, post-quantum cryptosystems are essential for protecting the vehicle communication systems from quantum attacks. However, standard CAN’s efficiency and payload sizes are too small for post-quantum cryptography. The Controller Area Network Flexible Data-Rate (CAN-FD) is an updated protocol for
APA, Harvard, Vancouver, ISO, and other styles
9

Johanna, Barzen, and Leymann Frank. "Post-Quantum Security: Origin, Fundamentals, and Adoption." Trends in Computer Science and Information Technology 9, no. 3 (2024): 106–28. https://doi.org/10.17352/tcsit.000089.

Full text
Abstract:
Based on Shor’s quantum algorithm for computing discrete logarithms, powerful enough quantum computers will break current cryptographic protocols. While today’s quantum computers are not yet capable enough of running this algorithm successfully, it is expected by many experts that they will be capable enough in the foreseeable future. Thus, actions must be taken to create a new infrastructure that protects society and companies against such attacks. In this contribution, we describe the backgrounds necessary to comprehend these actions. We first describe the relation between discrete logarithm
APA, Harvard, Vancouver, ISO, and other styles
10

Hosoyamada, Akinori. "On post-quantum security of symmetric cryptosystems." IEICE ESS Fundamentals Review 17, no. 1 (2023): 59–71. http://dx.doi.org/10.1587/essfr.17.1_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Iavich, Maksim, and Dana Amirkhanova Sairangazhykyzy. "Post-quantum Digital Signatures using ElGamal Approach." International Journal of Computer Network and Information Security 17, no. 3 (2025): 89–108. https://doi.org/10.5815/ijcnis.2025.03.06.

Full text
Abstract:
The paper offers a novel digital signature scheme that integrates ElGamal cryptographic principles with the Short Integer Solution (SIS) problem, specifically designed to ensure post-quantum security. As quantum computers advance and present significant risks to traditional cryptographic systems, this scheme offers an interesting alternative for securing digital signatures against potential quantum threats. The scheme uses only basic secure principles. The offered approach offers key generation, where parameters and random matrices are selected, and signature generation, which involves creatin
APA, Harvard, Vancouver, ISO, and other styles
12

Song, Gyeongju, Kyoungbae Jang, Hyunjun Kim, et al. "SPEEDY Quantum Circuit for Grover’s Algorithm." Applied Sciences 12, no. 14 (2022): 6870. http://dx.doi.org/10.3390/app12146870.

Full text
Abstract:
In this paper, we propose a quantum circuit for the SPEEDY block cipher for the first time and estimate its security strength based on the post-quantum security strength presented by NIST. The strength of post-quantum security for symmetric key cryptography is estimated at the cost of the Grover key retrieval algorithm. Grover’s algorithm in quantum computers reduces the n-bit security of block ciphers to n2 bits. The implementation of a quantum circuit is required to estimate the Grover’s algorithm cost for the target cipher. We estimate the quantum resource required for Grover’s algorithm by
APA, Harvard, Vancouver, ISO, and other styles
13

Sharadadevi Kaganurmath. "Post-Quantum Lightweight Key Sharing Protocol for Secure MQTT-Based IoT Networks." Journal of Information Systems Engineering and Management 10, no. 42s (2025): 532–45. https://doi.org/10.52783/jisem.v10i42s.7914.

Full text
Abstract:
The Post-Quantum Lightweight Key Sharing Protocol for Secure MQTT-Based IoT Networks (PQLKS-MQTT) addresses the critical need for quantum-resistant and resource-efficient security in IoT communications. As the proliferation of IoT devices continues, securing MQTT-based networks against evolving threats, including quantum attacks, becomes imperative. PQLKS-MQTT integrates the Kyber Key Encapsulation Mechanism for post-quantum key exchanges, along with BLAKE2s hashing and ChaCha20 encryption, to ensure robust security with minimal resource consumption. Implemented using the Cooja simulator with
APA, Harvard, Vancouver, ISO, and other styles
14

Djordjevic, Ivan B. "Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography." Entropy 24, no. 7 (2022): 935. http://dx.doi.org/10.3390/e24070935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Bene, Fruzsina, and Attila Kiss. "Post-Quantum Security Overview of the Public Key Infrastructure." SYSTEM THEORY, CONTROL AND COMPUTING JOURNAL 3, no. 2 (2023): 27–35. http://dx.doi.org/10.52846/stccj.2023.3.2.55.

Full text
Abstract:
Recently, there has been an increasing focus on the investigation of quantum-safe solutions for a variety of applications. One of the pressing issues that needs to be made quantum secure is the TLS (Transport Layer Security) protocol. Proposals for its implementation have been discussed in several articles. The TLS protocol is based on PKI (Public Key Infrastructure). In addition, there are many other PKI applications that are used every day in both private and enterprise environments, so securing their use is essential. The methods currently developed to ensure adequate security will become o
APA, Harvard, Vancouver, ISO, and other styles
16

Shuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.

Full text
Abstract:
As quantum computing continues to evolve, traditional cryptographic systems face significant vulnerabilities,especially asymmetric algorithms based on factorization and discrete logarithms. In response, the integration of QuantumKey Distribution with post-quantum cryptography presents a promising hybrid approach to ensuring long-term data security.This new topic explores the design and development of cryptographic systems that combine the computational resilienceof post-quantum cryptography algorithms, such as lattice-based cryptography, with the physical security guaranteesprovided by Quantum
APA, Harvard, Vancouver, ISO, and other styles
17

Kumar Bathala, Naresh, Naga Pawan YVR, Dhrubajyoti Choudhury, Ambika M, Kannadhasan S, and Padmavathy R. "Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems." ITM Web of Conferences 76 (2025): 05005. https://doi.org/10.1051/itmconf/20257605005.

Full text
Abstract:
Quantum computing has the potential to transforming computational paradigms, posing both a threat and an opportunity to contemporary cryptographic systems and data security frameworks. As quantum algorithms improve, pose a risk to traditional encryption solutions, and the concepts of post-quantum cryptography and quantum-safe security architectures gain momentum, it is of paramount importance that organizations stay ahead of the threat landscape. Keywords— Quantum Computing, Cryptography, Information Systems. This work reviewed the implications of quantum computing in the field of Cryptography
APA, Harvard, Vancouver, ISO, and other styles
18

Wayne, Henderson, Magal Mykhailo, and P. Autry Christopher. "Fully Decentralised, Post-Quantum Secure Networks." International Journal of Mathematics And Computer Research 10, no. 04 (2022): 2644–45. https://doi.org/10.5281/zenodo.6409629.

Full text
Abstract:
The Fourth Industrial Revolution, Industry 4.0, promises trillions of dollars of value creation by connecting billions of sensors and actuators to analytical engines, thereby creating the Industrial Internet of Things (IIoT). This revolution will push decision making to the edge and connect the edge to the center. The revolution faces three major technical challenges: interoperability between devices, security of edge devices and legacy infrastructure. This paper describes an implementation of a fundamentally new authentication and encryption technology (“dOISP™), that allows devic
APA, Harvard, Vancouver, ISO, and other styles
19

B, Sonia Singh, Sravan Karthik T, and Shubhaprada KP. "Investigating SHA and Proposing SPHINCS+ as a Post Quantum Algorithm (PQC)." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (2023): 1611–15. http://dx.doi.org/10.22214/ijraset.2023.55872.

Full text
Abstract:
Abstract: In the swiftly evolving landscape of cryptography, the advent of quantum computing poses unprecedented challenges to the established security paradigms. This research embarks on an extensive exploration into the resilience of the SHA-256 hashing algorithm, a linchpin of contemporary cryptographic infrastructure, against the looming threat posed by quantum computers. Our principal aim is to comprehensively assess the susceptibility of SHA-256, especially within the context of its critical role in ensuring the security and immutability of the Bitcoin blockchain. As quantum computing's
APA, Harvard, Vancouver, ISO, and other styles
20

Renita, J. "From Inception to Realization: NIST's Post-Quantum Cryptography Standardization." Indian Journal of Cryptography and Network Security (IJCNS) 5, no. 1 (2025): 8–19. https://doi.org/10.54105/ijcns.A1437.05010525.

Full text
Abstract:
<strong>Abstract: </strong>Cryptography is a term that safeguards the security of electronic banking transactions, and emails, and most importantly our country relies on cryptography for national security purposes. Post Quantum Cryptography (PQC) has a major aim of developing newer cryptographic schemes that make the cryptosystem secure against quantum computers. This is a state-of-the-art research topic, and it is encouraged by some security agencies like the National Security Agency (NSA). This paper presents a concise and up-to-date review of post-quantum cryptographic (PQC) algorithms subm
APA, Harvard, Vancouver, ISO, and other styles
21

Tuhin Banerjee. "Post-quantum cryptography: Reshaping the future of identity and access management." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 350–56. https://doi.org/10.30574/wjaets.2025.15.2.0567.

Full text
Abstract:
The emergence of quantum computing presents significant challenges to existing Identity and Access Management (IAM) systems, particularly concerning the security of current cryptographic algorithms. As quantum computers evolve, traditional public-key cryptography methods like RSA and ECC face increasing vulnerability, necessitating a transition to quantum-resistant alternatives. This document explores the critical intersection of post-quantum cryptography and IAM, examining the transformation required in security frameworks to maintain resilience in a quantum-enabled future. The discussion enc
APA, Harvard, Vancouver, ISO, and other styles
22

Aravinda, S., Anindita Banerjee, Anirban Pathak, and R. Srikanth. "Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories." International Journal of Quantum Information 12, no. 07n08 (2014): 1560020. http://dx.doi.org/10.1142/s0219749915600205.

Full text
Abstract:
We introduce the concept of cryptographic reduction, in analogy with a similar concept in computational complexity theory. In this framework, class A of crypto-protocols reduces to protocol class B in a scenario X, if for every instance a of A, there is an instance b of B and a secure transformation X that reproduces a given b, such that the security of b guarantees the security of a. Here we employ this reductive framework to study the relationship between security in quantum key distribution (QKD) and quantum secure direct communication (QSDC). We show that replacing the streaming of indepen
APA, Harvard, Vancouver, ISO, and other styles
23

Enoch, Oluwademilade Sodiya, Joseph Umoga Uchenna, Oladipupo Amoo Olukunle, and Atadoga Akoh. "Quantum computing and its potential impact on U.S. cybersecurity: A review: Scrutinizing the challenges and opportunities presented by quantum technologies in safeguarding digital assets." Global Journal of Engineering and Technology Advances 18, no. 2 (2024): 049–64. https://doi.org/10.5281/zenodo.10947345.

Full text
Abstract:
This study explores the dual impact of quantum computing on cybersecurity, focusing on the challenges it poses to existing cryptographic standards and the opportunities it presents for enhancing secure communication. Through a comprehensive review of current literature and analysis of emerging quantum-resistant technologies such as Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC), the research identifies key vulnerabilities in traditional encryption methods and outlines the potential of quantum technologies to revolutionize cybersecurity practices. The study emphasizes the ur
APA, Harvard, Vancouver, ISO, and other styles
24

Sharma, Ankita. "PROTOCOLS FOR QUANTUM-RESISTANT NETWORKS." International Research Journal of Computer Science 08, no. 07 (2021): 165–71. http://dx.doi.org/10.26562/irjcs.2021.v0807.006.

Full text
Abstract:
With the progression of quantum computing technology, traditional cryptographic protocols encounter flaws that may compromise their efficacy against quantum-based assaults. This study examines quantum-resistant protocols that include post-quantum cryptography (PQC) to enhance the security of existing network protocols, particularly the Transport Layer Security (TLS) protocol. This research examines the efficiency, compatibility, and adaptability of post-quantum algorithms, including lattice-based, code-based, and hash-based cryptographic methods, inside the TLS protocol architecture. The study
APA, Harvard, Vancouver, ISO, and other styles
25

Latika Rahul Desai. "Advanced Techniques in Post-Quantum Cryptography for Ensuring Data Security in the Quantum Era." Panamerican Mathematical Journal 35, no. 1s (2024): 58–71. http://dx.doi.org/10.52783/pmj.v35.i1s.2097.

Full text
Abstract:
The arrival of quantum computers is a major threat to current security methods, which depend on problems like discrete logarithms and integer factorization being hard. Post-quantum cryptography (PQC) is getting to be an critical field for making secure strategies that can't be broken by quantum assaults. This exposition talks almost progressed PQC strategies, centered on the most up to date thoughts and what they cruel for securing information within the quantum age. To begin with, we see at lattice-based cryptography, which appears like a great choice since it has solid security roots and can
APA, Harvard, Vancouver, ISO, and other styles
26

Santoso, Bagus, and Chunhua Su. "A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 294–308. https://doi.org/10.3217/jucs-025-03-0294.

Full text
Abstract:
Recently, in order to guarantee security against quantum adversaries, several identification (ID) schemes based on computational problems which are supposed to be hard even for quantum computers have been proposed. However, their security are only proven against non-quantum adversaries. In this paper, we proposed a novel four-pass code-based identification scheme. By using quantum random oracle model, we provide a security proof for our scheme against quantum adversaries which aim to impersonate the prover under concurrent active attacks, based on the hardness assumption of syndrome decoding (
APA, Harvard, Vancouver, ISO, and other styles
27

Derek Asir Muthurajan Caleb. "Quantum-secure data centers: Preparing critical infrastructure for the post-quantum era." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 2950–59. https://doi.org/10.30574/wjarr.2025.26.2.1742.

Full text
Abstract:
This article examines the emerging necessity of quantum-secure infrastructure in data centers amid advancing quantum computing capabilities that threaten conventional cryptographic systems. It provides a comprehensive analysis of quantum security fundamentals, implementation methodologies across data center ecosystems, and the evolving international regulatory landscape governing these technologies. This article explores various cryptographic approaches that offer quantum resistance, comparing their advantages against traditional security frameworks while detailing practical migration strategi
APA, Harvard, Vancouver, ISO, and other styles
28

Shivarudraiah, Arjun. "Quantum Computing’s Impact on Banking Encryption: Preparing for Post-Quantum Security." International Journal of AI, BigData, Computational and Management Studies 4 (2023): 40–49. https://doi.org/10.63282/3050-9416.ijaibdcms-v4i3p105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Rama Krishna, Mallu Shiva, Patwari KrishnaRao, and Manumula Srinubabu. "Evaluating the Impact of Quantum Algorithms on Modern Cybersecurity Mechanisms." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft016.

Full text
Abstract:
Abstract—The emergence of quantum computing represents a fundamental challenge to contemporary cryptographic infras- tructures, mandating immediate adoption of quantum-resistant cryptographic standards to ensure long-term security. This paper analyzes how Shor’s algorithm renders RSA , ECC vulnerable by solving integer factorization and discrete alogarithm problems in polynomial time, while Grover’s algorithm weakens symmetric encryption through quadratic speedup attacks. Through compre- hensive cryptanalysis, we evaluate the vulnerabilities of current public-key infrastructures, symmetric cip
APA, Harvard, Vancouver, ISO, and other styles
30

Subbarao, Kondapalli V. V., and Manas Kumar Yogi. "An Investigative Study on Variants of Post-Quantum RSA." Journal of Cryptography and Network Security, Design and Codes 1, no. 1 (2024): 19–31. http://dx.doi.org/10.46610/jocnsdc.2024.v01i01.003.

Full text
Abstract:
As quantum computing advances, traditional cryptographic schemes such as RSA face increasing vulnerability to attacks. This investigative study delves into the realm of post-quantum cryptography, focusing specifically on variants of RSA designed to resist quantum attacks. Through a comprehensive review of existing literature and cryptographic protocols, we analyse the strengths and weaknesses of various post-quantum RSA variants, including lattice-based, code-based, and hash-based approaches. Additionally, we evaluate the computational efficiency and security guarantees of these variants, cons
APA, Harvard, Vancouver, ISO, and other styles
31

Kandii, S. O., and I. D. Gorbenko. "Analysis of DSTU 8961:2019 in the quantum random oracle model." Radiotekhnika, no. 214 (September 29, 2023): 7–16. http://dx.doi.org/10.30837/rt.2023.3.214.01.

Full text
Abstract:
Modern cryptographic transformations require provable security against a relatively wide class of threats. Typically, such evidentiary security is achieved through formal analysis within the chosen security model. The development of quantum computers led to the emergence of new attack vectors to which classical cryptography was vulnerable. However, there are cryptographic systems that are considered resistant to quantum attacks and some of them are even standardized. The formal analysis of such systems has faced difficulties for a long time, which were associated with the impossibility of appl
APA, Harvard, Vancouver, ISO, and other styles
32

Ghosh, Sagarika, Marzia Zaman, Gary Sakauye, and Srinivas Sampalli. "An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme." Applied Sciences 11, no. 5 (2021): 2082. http://dx.doi.org/10.3390/app11052082.

Full text
Abstract:
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12. Therefore, researchers are developing various security schemes based on either quantum or post-quantum algorithms. However, the efficiency of quantum algorithms impacts the security of the post-quantum digital signature scheme. We propose an intrusion resistant algorithm exploiting and applying quantum principles in the post-quantum signature algorithm. We use the Bennett 1992 (B92) protocol, a quantum key distribution scheme
APA, Harvard, Vancouver, ISO, and other styles
33

Henge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, et al. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology." Networks and Heterogeneous Media 18, no. 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.

Full text
Abstract:
&lt;abstract&gt; &lt;p&gt;The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-ba
APA, Harvard, Vancouver, ISO, and other styles
34

Gabriel, O., S. O. Olabiyisi, W. O. Ismaila,, O. A. Falade, and O. Alawode. "Integrating Quantum Computing Into Blockchain: Strategies for Overcoming Scalability and Security Challenges." Advances in Multidisciplinary & Scientific Research Journal Publication 15, no. 3 (2024): 15–28. http://dx.doi.org/10.22624/aims/cisdi/v15n3p2.

Full text
Abstract:
The rapid progression of quantum computing has created new opportunities for advancing blockchain technology, particularly in addressing its two primary challenges which are scalability and security. As blockchain adoption grows, traditional consensus mechanisms reveal significant inefficiencies, causing transaction bottlenecks and increased latency. Additionally, the advent of quantum computing poses a significant threat to the classical cryptographic algorithms foundational to blockchain security. This research introduces an innovative approach that harnesses quantum computing to address the
APA, Harvard, Vancouver, ISO, and other styles
35

Yevseiev, Serhii, Alla Gavrilova, Bogdan Tomashevsky, and Firuz Samadov. "Research of crypto-code designs construction for using in post quantum cryptography." Development Management 16, no. 4 (2019): 26–39. http://dx.doi.org/10.21511/dm.4(4).2018.03.

Full text
Abstract:
The article analyzes construction of crypto-code designs (CCDs) on the basis of asymmetric Mac-Alice and Niederreiter crypto-code systems on elliptical (EC) and modified elliptic codes (MEC), which, in the conditions of post-quantum cryptography, allow to provide a guaranteed level of crypto stability, to counteract the modern Attacks and attack by V. Sidelnikov on the theoretical code schemes of McAlias and Niederreiter. Schemes of hybrid crypto-code designs constraction the lossy codes are addressed. Methods of constructing mechanisms of confidentiality and integrity of banking information r
APA, Harvard, Vancouver, ISO, and other styles
36

Abura, Samson. "Quantum computing and wireless networks security: A survey." GSC Advanced Research and Reviews 20, no. 2 (2024): 199–230. https://doi.org/10.5281/zenodo.14969953.

Full text
Abstract:
Quantum computing, with its potential to solve complex problems exponentially faster than classical computers, is poised to revolutionize various fields, including wireless networks security. This survey paper provides a comprehensive overview of the intersection between quantum computing and wireless networks security. We examine the potential threats quantum computing poses to classical encryption algorithms, such as RSA and ECC, which are foundational to the security of current wireless networks. Additionally, we explore emerging quantum-resistant cryptographic techniques designed to safegu
APA, Harvard, Vancouver, ISO, and other styles
37

V A, Neethu. "Strengthening Cloud Security Against Cyber Attacks: Integrating Blockchain and Quantum Cryptography for Enhanced Integrity and Protection." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45949.

Full text
Abstract:
Abstract: As cloud computing becomes a central part of everyday operations, securing these environments against growing cyber threats is increasingly critical. Traditional security measures are struggling to keep pace with the rapid development of new attack methods, particularly as quantum computing threatens to break existing encryption standards. This paper explores the integration of blockchain and quantum cryptography to address these challenges and strengthen cloud security. While blockchain offers a visible, unchangeable record that guarantees data integrity, quantum cryptography offers
APA, Harvard, Vancouver, ISO, and other styles
38

Fakhruldeen, Hassan Falah, Rana Abbas Al-Kaabi, Feryal Ibrahim Jabbar, Ibrahim H. Al-Kharsan, and Sarah Jawad Shoja. "Post-quantum Techniques in Wireless Network Security: An Overview." Malaysian Journal of Fundamental and Applied Sciences 19, no. 3 (2023): 337–44. http://dx.doi.org/10.11113/mjfas.v19n3.2905.

Full text
Abstract:
Post quantum is a general name to all the techniques which are safe against the quantum computer attack. The wireless network is one of the most important means of communication. Wireless network security is a top priority. Wireless networks use conventional cryptography, which has various flaws, whereas quantum cryptography claims to be completely secure. It wasn't long after quantum computers became operational that people began to think about new ways to secure electronic communications. After considering all of the weaknesses in conventional cryptosystems, individuals began to look for new
APA, Harvard, Vancouver, ISO, and other styles
39

Kim, Hyunjun, Wonwoong Kim, Yeajun Kang, Hyunji Kim, and Hwajeong Seo. "Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm." Applied Sciences 14, no. 18 (2024): 8394. http://dx.doi.org/10.3390/app14188394.

Full text
Abstract:
The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) and elliptic-curve cryptography (ECC)) using Shor’s algorithm pose a serious threat to the security of pre-quantum blockchain technologies. This paper proposes an efficient quantum-safe blockchain that incorporates new quantum-safe consensus algorithms. We integrate post-quantum signature schemes into the blockchain’s transaction signing and verification processes to enhance resistance against quantum attacks. Specifically, we employ th
APA, Harvard, Vancouver, ISO, and other styles
40

Cultice, Tyler, Joseph Clark, Wu Yang, and Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World." Sensors 23, no. 24 (2023): 9886. http://dx.doi.org/10.3390/s23249886.

Full text
Abstract:
As the popularity of 3D printing or additive manufacturing (AM) continues to increase for use in commercial and defense supply chains, the requirement for reliable, robust protection from adversaries has become more important than ever. Three-dimensional printing security focuses on protecting both the individual Industrial Internet of Things (I-IoT) AM devices and the networks that connect hundreds of these machines together. Additionally, rapid improvements in quantum computing demonstrate a vital need for robust security in a post-quantum future for critical AM manufacturing, especially for
APA, Harvard, Vancouver, ISO, and other styles
41

Ehsan, M. Awais, Walaa Alayed, Amad Ur Rehman, Waqar ul Hassan, and Ahmed Zeeshan. "Post-Quantum KEMs for IoT: A Study of Kyber and NTRU." Symmetry 17, no. 6 (2025): 881. https://doi.org/10.3390/sym17060881.

Full text
Abstract:
Current improvements in quantum computing present a substantial challenge to classical cryptographic systems, which typically rely on problems that can be solved in polynomial time using quantum algorithms. Consequently, post-quantum cryptography (PQC) has emerged as a promising solution to emerging quantum-based cryptographic challenges. The greatest threat is public-key cryptosystems, which are primarily responsible for key exchanges. In PQC, key encapsulation mechanisms (KEMs) are crucial for securing key exchange protocols, particularly in Internet communication, virtual private networks (
APA, Harvard, Vancouver, ISO, and other styles
42

Krishnaprabha. R. "Leveraging LDPC-Optimized Niederreiter Cryptosystems for Quantum-Resilient IoT Security Applications." Communications on Applied Nonlinear Analysis 32, no. 6s (2025): 215–40. https://doi.org/10.52783/cana.v32.3288.

Full text
Abstract:
The Niederreiter Cryptosystem is a well-established post-quantum cryptographic scheme knownfor its security, yet it suffers from large key sizes and computational inefficiencies, making it lesssuitable for resource-constrained environments like the Internet of Things (IoT) and large-scale communications. This paper presents an enhanced version of the Niederreiter Cryptosystem by integrating Low-Density Parity-Check (LDPC) codes, a class of error-correcting codes characterized by sparse matrices that enable efficient decoding. By leveraging the structural advantages of LDPC codes, the proposed
APA, Harvard, Vancouver, ISO, and other styles
43

Dan BORUGA, Daniel BOLINTINEANU, and George Iulian RACATES. "Quantum-enhanced algorithms for real-time processing in cryptographic systems: A path towards post-quantum security." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 193–204. http://dx.doi.org/10.30574/wjaets.2024.13.2.0561.

Full text
Abstract:
New technologies such as quantum computing present a major challenge to the current cryptographic systems; thus, quantum-resistant techniques are required. This work describes a new approach for adapting QE schemes to real-life IT security applications, giving a glimpse of the way to post-quantum security. Hence, the architecture proposed here incorporates classical and quantum methods to present a vast enhancement in speed and the stability of security. The system seeks to solve this problem using a hybrid quantum-classical computing strategy. It achieves a 470 percent performance improvement
APA, Harvard, Vancouver, ISO, and other styles
44

Gabriel, O., S. O. Olabiyisi,, W. O. Ismaila, O. A. Falade, and O. Alawode. "Integrating Quantum Computing Into Blockchain: Strategies for Overcoming Scalability and Security Challenges." Advances in Multidisciplinary & Scientific Research Journal Publication 15, no. 3 (2024): 15–28. http://dx.doi.org/10.22624/aims/cisdi/v15n3p2x.

Full text
Abstract:
, , , , &amp; Department of Computer Science and Pure &amp; Applied Physics Ladoke Akintola University of Technology Ogbomoso, Oyo State, Nigeria E-mails: golamiji@lautech.edu.ng, soolabiyisi@lautech.edu.ng, woismaila@lautech.edu.ng, ofalade28@pgschool.lautech.edu.ng, ljmkadeola@gmail.com ABSTRACT The rapid progression of quantum computing has created new opportunities for advancing blockchain technology, particularly in addressing its two primary challenges which are scalability and security. As blockchain adoption grows, traditional consensus mechanisms reveal significant inefficiencies, cau
APA, Harvard, Vancouver, ISO, and other styles
45

Banks, Michael. "US outlines shift to ‘post-quantum cryptography’." Physics World 35, no. 6 (2022): 12iii. http://dx.doi.org/10.1088/2058-7058/35/06/18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Yang, Yujin, Kyungbae Jang, Anubhab Baksi, and Hwajeong Seo. "Optimized Implementation and Analysis of CHAM in Quantum Computing." Applied Sciences 13, no. 8 (2023): 5156. http://dx.doi.org/10.3390/app13085156.

Full text
Abstract:
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions. Recently, studies on quantum approaches have proposed analyzing potential quantum attacks using the Grover search algorithm in conjunction with optimized quantum circuit implementations for symmetric-key cryptography and hash functions. Analyzing quantum attacks on a cipher (i.e., quantum cryptanalysis) and estimating the necessary quantum resources are rela
APA, Harvard, Vancouver, ISO, and other styles
47

Enjamuri, Naresh. "The Future of API Security: Post-Quantum Cryptography and Beyond." European Journal of Computer Science and Information Technology 13, no. 35 (2025): 98–110. https://doi.org/10.37745/ejcsit.2013/vol13n3598110.

Full text
Abstract:
The inevitable advance of quantum computing presents significant challenges to current API security frameworks that predominantly rely on classical cryptographic algorithms. This article examines how emerging post-quantum cryptographic technologies are reshaping API security landscapes in preparation for a quantum-capable future. From lattice-based algorithms like CRYSTALS-Kyber and Dilithium to Quantum Key Distribution networks achieving secure communications across intercontinental distances, a new generation of security mechanisms is being developed to safeguard API infrastructures against
APA, Harvard, Vancouver, ISO, and other styles
48

Alupotha, Jayamine, Xavier Boyen, and Matthew McKague. "LACT+: Practical Post-Quantum Scalable Confidential Transactions." Cryptography 7, no. 2 (2023): 24. http://dx.doi.org/10.3390/cryptography7020024.

Full text
Abstract:
A “confidential monetary value” carries information about the real monetary value but does not disclose it. Post-quantum private blockchains with confidential monetary values—large-sized blockchains with large verification times—have the least scalability because they need to save and verify more information than those with “plain-text monetary values”. High scalability is an essential security requirement for decentralized blockchain payment systems because the more honest peers who can afford to verify the blockchain copies are, the higher the security. We propose a quantum-safe transaction
APA, Harvard, Vancouver, ISO, and other styles
49

Ghashghaei, Farshad Rahimi, Yussuf Ahmed, Nebrase Elmrabit, and Mehdi Yousefi. "Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution." Computers 13, no. 7 (2024): 163. http://dx.doi.org/10.3390/computers13070163.

Full text
Abstract:
This research aims to establish a secure system for key exchange by using post-quantum cryptography (PQC) schemes in the classic channel of quantum key distribution (QKD). Modern cryptography faces significant threats from quantum computers, which can solve classical problems rapidly. PQC schemes address critical security challenges in QKD, particularly in authentication and encryption, to ensure the reliable communication across quantum and classical channels. The other objective of this study is to balance security and communication speed among various PQC algorithms in different security le
APA, Harvard, Vancouver, ISO, and other styles
50

Algazy, Kunbolat, Kairat Sakan, Saule Nyssanbayeva, and Oleg Lizunov. "Syrga2: Post-Quantum Hash-Based Signature Scheme." Computation 12, no. 6 (2024): 125. http://dx.doi.org/10.3390/computation12060125.

Full text
Abstract:
This paper proposes a new post-quantum signature scheme, Syrga2, based on hash functions. As known, existing post-quantum algorithms are classified based on their structures. The proposed Syrga2 scheme belongs to the class of multi-use signatures with state retention. A distinctive feature of state-retaining signatures is achieving a compromise between performance and signature size. This scheme enables the creation of a secure signature for r messages using a single pair of secret and public keys. The strength of signature algorithms based on hash functions depends on the properties of the ha
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!