Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review

MA Khan, S Javaid, SAH Mohsan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being
employed across a broad spectrum of applications, ranging from military operations to …

A RISC-V post quantum cryptography instruction set extension for number theoretic transform to speed-up CRYSTALS algorithms

P Nannipieri, S Di Matteo, L Zulberti, F Albicocchi… - IEEE …, 2021 - ieeexplore.ieee.org
In recent years, public-key cryptography has become a fundamental component of digital
infrastructures. Such a scenario has to face a new and increasing threat, represented by …

Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey

J Chen, H Deng, H Su, M Yuan, Y Ren - Electronics, 2024 - mdpi.com
As the most popular cryptographic scheme in the post-quantum field, lattices have received
extensive attention and research. Not only do they provide quantum-resistant security, they …

[PDF][PDF] Analysis of code-based digital signature schemes.

R Khurana, E Narwal - International Journal of Electrical & …, 2023 - researchgate.net
Digital signatures are in high demand because they allow authentication and non-
repudiation. Existing digital signature systems, such as digital signature algorithm (DSA) …

[PDF][PDF] Quantum computers and algorithms: a threat to classical cryptographic systems

JJ Tom, NP Anebo, BA Onyekwelu… - Int. J. Eng. Adv …, 2023 - researchgate.net
Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecurity
and high-profile cyberattacks. In recent times, information security scientists and researchers …

Certificateless signcryption scheme from lattice

H Yu, L Bai, M Hao, N Wang - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Certificateless signcryption can simultaneously provide certificateless signature and
encryption. In recent years, many certificateless signcryption schemes have been proposed …

[PDF][PDF] Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks

S Bhatt, B Bhushan, T Srivastava, VS Anoop - 5G and Beyond, 2023 - library.oapen.org
Abstract 5G is the fifth generation of broadband cellular network and beyond 5G can be the
6G, which will be the sixth generation of broadband cellular network. Even though studies …

[PDF][PDF] Security Enhanced Crowdfunding Using Blockchain and Lattice Based Cryptosystem

K Vidya, HI Hussain, V Celestine, V Kumar… - 2022 - academia.edu
Crowdfunding is a method of raising funds from a large number of individuals or businesses.
Investors can contribute to any project they are interested in and earn if the initiative is …

[HTML][HTML] A generalization of NTRUEncrypt—cryptosystem based on ideal lattice

Z Zheng, F Liu, W Huang, J Xu, K Tian - Journal of Information Security, 2022 - scirp.org
The purpose of this article is to extend the theory of circulant matrix to general ideal matrix,
and to construct more general NTRU cryptosystem combined with the φ-cyclic code. To …

Unbreakable Security in a Quantum Age: A Systematic Literature Review on Post-Quantum Lattice-Based Standards

R Wahlang, K Chandrasekaran - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The rapid advances in the field of quan-tum computing have led to a concern in the cryp-
tographic security implemented in already existing systems. This has led to an increasing …