A Review on the Use of Blockchain for the Internet of Things

TM Fernández-Caramés, P Fraga-Lamas - Ieee Access, 2018 - ieeexplore.ieee.org
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our
daily objects will be interconnected and will interact with their environment in order to collect …

A review on blockchain technologies for an advanced and cyber-resilient automotive industry

P Fraga-Lamas, TM Fernández-Caramés - IEEE access, 2019 - ieeexplore.ieee.org
In the last century, the automotive industry has arguably transformed society, being one of
the most complex, sophisticated, and technologically advanced industries, with innovations …

[HTML][HTML] How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits

C Gidney, M Ekerå - Quantum, 2021 - quantum-journal.org
We significantly reduce the cost of factoring integers and computing discrete logarithms in
finite fields on a quantum computer by combining techniques from Shor 1994, Griffiths-Niu …

Experimental quantum secure network with digital signatures and encryption

HL Yin, Y Fu, CL Li, CX Weng, BH Li, J Gu… - National Science …, 2023 - academic.oup.com
Cryptography promises four information security objectives, namely, confidentiality, integrity,
authenticity and non-repudiation, to support trillions of transactions annually in the digital …

Toward the first quantum simulation with quantum speedup

AM Childs, D Maslov, Y Nam… - Proceedings of the …, 2018 - National Acad Sciences
With quantum computers of significant size now on the horizon, we should understand how
to best exploit their initially limited abilities. To this end, we aim to identify a practical problem …

Quantum algorithms: an overview

A Montanaro - npj Quantum Information, 2016 - nature.com
Quantum computers are designed to outperform standard computers by running quantum
algorithms. Areas in which quantum algorithms can be applied include cryptography, search …

The first collision for full SHA-1

M Stevens, E Bursztein, P Karpman, A Albertini… - Advances in Cryptology …, 2017 - Springer
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially
deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in …

Imperfect forward secrecy: How Diffie-Hellman fails in practice

D Adrian, K Bhargavan, Z Durumeric… - Proceedings of the …, 2015 - dl.acm.org
We investigate the security of Diffie-Hellman key exchange as used in popular Internet
protocols and find it to be less secure than widely believed. First, we present Logjam, a …

From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things

TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …

Quantum computing and simulations for energy applications: Review and perspective

HP Paudel, M Syamlal, SE Crawford, YL Lee… - ACS Engineering …, 2022 - ACS Publications
Quantum computing and simulations are creating transformative opportunities by exploiting
the principles of quantum mechanics in new ways to generate and process information. It is …