The machinery of industrial environments was connected to the Internet years ago with the scope of increasing their performance. However, this made such environments vulnerable …
For cyber-physical systems (CPS), ensuring process and data security is critically important since the corresponding infrastructure needs to have high operational efficiency with no …
L Malina, P Dobias, J Hajny, KKR Choo - Proceedings of the 18th …, 2023 - dl.acm.org
As quantum-safe algorithms are increasingly implemented in security protocols used in current and emerging digital services, there is also a corresponding need to map the current …
S Paul, P Scheible, F Wiemer - Journal of Computer Security, 2022 - content.iospress.com
The threat of a cryptographically relevant quantum computer contributes to an increasing interest in the field of post-quantum cryptography (PQC). Compared to existing research …
SE Yunakovsky, M Kot, N Pozhar, D Nabokov… - EPJ Quantum …, 2021 - epjqt.epj.org
Quantum computing technologies pose a significant threat to the currently employed public- key cryptography protocols. In this paper, we discuss the impact of the quantum threat on …
Large-scale quantum computers will be able to efficiently solve the mathematical problems of currently deployed public-key cryptography, rendering RSA and elliptic-curve …
A Abuarqoub - Proceedings of the 4th International Conference on …, 2020 - dl.acm.org
Quantum computing has quickly become at the vanguard of many computer science fields today. This is motivated by quantum computers ability to perform computational tasks with …
Large quantum computers have the potential to break many cryptographic systems, eg, Rivest–Shamir–Adleman, Diffie–Hellman key exchange, and the elliptical curve …
H TOUIL, N EL AKKAD… - International Journal of …, 2024 - journals.uob.edu.bh
This research addresses the escalating security concerns associated with the rapid evolution of quantum computers. With quantum advancements posing potential threats to …