Search
Search Results
-
-
Quantum-resilient framework for healthcare data security using multivariate polynomial cryptography
The rapid advancement of quantum computing presents a significant threat to traditional cryptographic systems, particularly in sectors that handle...
-
-
Post-Quantum Cryptography
This chapter is devoted to post-quantum cryptography (PQC) concepts. Following the introduction, the following lattice-based cryptography concepts... -
Post-quantum Cryptography: A Review on Cryptographic Solutions for the Era of Quantum Computing
The emergence of Quantum Computing (QC) presents a substantial risk to conventional cryptography systems, many of which are vulnerable to Shor’s...
-
Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8–10, 2025, Proceedings, Part I
The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025,...
-
Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8–10, 2025, Proceedings, Part II
The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025,...
-
QuantumResist: integrating shor’s algorithm, lattice-based cryptography, and quantum error correction for enhanced secure communication in post-quantum cryptography
QuantumResist brings a new and improved way to secure communication in the quantum computing age with its use of lattice-based cryptography, quantum...
-
On Quantum Transition in Cryptography through the Lens of Bibliometrics
AbstractCryptography, which has a history going back many centuries, is currently experiencing a transition from the classical paradigm to a quantum...
-
Cryptography
Before the modern age, cryptography was only used for encryption which is to use a secret key to convert readable text (cleartext) to unintelligible... -
No Sum (NS) Sequence Based Post-Quantum Cryptography
Quantum computing is becoming a significant technology for addressing complex problems, including those in cryptography. Traditional cryptography now...
-
Multivariate Blind Signatures Revisited
In 2017, Petzoldt, Szepieniec, and Mohamed proposed a blind signature scheme, based on multivariate cryptography. This construction has been expanded... -
The regular multivariate quadratic problem
In this work, we introduce a novel variant of the multivariate quadratic problem, which is at the core of one of the most promising post-quantum...
-
Lattice-Based Cryptography: A Survey
Most of current public key cryptosystems would be vulnerable to the attacks of the future quantum computers. Post-quantum cryptography offers...
-
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices
With the emergence of quantum computers, traditional cryptographic methods are vulnerable to attacks, emphasizing the need for post-quantum...
-
Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part I
The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...
-
Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II
The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...
-
Exploring the landscape of post quantum cryptography: a bibliometric analysis of emerging trends and research impact
With the emergence of quantum computers, classical cryptography is facing significant challenges. Address this compelling problem, it is the need of...
-
Review on lightweight cryptography techniques and steganography techniques for IoT environment
In the modern world, technology has connected to our day-to-day life in different forms. The Internet of Things (IoT) has become an innovative...
-
An Effective Security Enhancement Scheme for Postquantum Cryptography Based Blockchain Networks in Cloud Computing
Lattice-based cryptography is widely embraced for its strong security and versatility, particularly in postquantum public key (PK) systems. The...