[PDF][PDF] Quantum implementation of ASCON linear layer

S Roy, A Baksi, A Chattopadhyay - Cryptology ePrint Archive, 2023 - core.ac.uk
In this paper, we show an in-place implementation of the ASCON linear layer. An in-place
implementation is important in the context of quantum computing, we expect our work will be …

A password less authentication protocol for multi-server environment using physical unclonable function

E Praveen Kumar, S Priyanka - The Journal of Supercomputing, 2023 - Springer
Password-based authentication is the most commonly used method to authenticate users to
get online services. In password-based authentication, the users must remember all their …

Cybersecurity and prevention in the quantum era

A Dwivedi, GK Saini, UI Musa - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Emerging future technologies such as Quantum computer is a serious threat to the privacy
and security of user data and organizational security. The speed of outperforming classical …

[HTML][HTML] An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security

O Popoola, MA Rodrigues, J Marchang, A Shenfield… - Internet of Things, 2024 - Elsevier
This study proposes an optimized hybrid encryption framework combining ECC-256r1 with
AES-128 in EAX mode, tailored for smart home healthcare environments, and conducts a …

[图书][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

LiCryptor: High-Speed and Compact Multi-Grained Reconfigurable Accelerator for Lightweight Cryptography

HL Pham, VTD Le, TH Vu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Emerging modern internet-of-things (IoT) systems require hardware development to support
multiple 8/32/64-bit lightweight cryptographic (LWC) algorithms with high speed and energy …

Insights into Cybercrime Detection and Response: A Review of Time Factor

H Taherdoost - Information, 2024 - mdpi.com
Amidst an unprecedented period of technological progress, incorporating digital platforms
into diverse domains of existence has become indispensable, fundamentally altering the …

Compact quantum circuit design of PUFFIN and PRINT lightweight ciphers for quantum key recovery attack

S Paramasivam, J Jenitha, S Sanjana… - IEEE …, 2023 - ieeexplore.ieee.org
Quantum computing plays a vital role in the next generation computing platforms as
researchers have achieved quantum supremacy by proving that quantum computers can …

Protection from a quantum computer cyber-attack: survey

JE Raya, AS Yahya, EK Ahmad - 2023 - techniumscience.com
Encryption is required to address the ongoing issue of information security within
communication networks. In the second part of the 20th century, quantum computing was …

Brand New Categories of Cryptographic Hash Functions: A Survey

B Sefid-Dashti, J Salimi Sartakhti… - Journal of Electrical and …, 2023 - jecei.sru.ac.ir
Background and Objectives: Cryptographic hash functions are the linchpins of mobile
services, blockchains, and many other technologies. Designing cryptographic hash …