The evolution of quantum key distribution networks: On the road to the qinternet

Y Cao, Y Zhao, Q Wang, J Zhang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol
capable of maintaining information-theoretic security. Given the recent advances in QKD …

Quantum computing: A taxonomy, systematic review and future directions

SS Gill, A Kumar, H Singh, M Singh… - Software: Practice …, 2022 - Wiley Online Library
Quantum computing (QC) is an emerging paradigm with the potential to offer significant
computational advantage over conventional classical computing by exploiting quantum …

Quantum computing for healthcare: A review

R Ur Rasool, HF Ahmad, W Rafique, A Qayyum… - Future Internet, 2023 - mdpi.com
In recent years, the interdisciplinary field of quantum computing has rapidly developed and
garnered substantial interest from both academia and industry due to its ability to process …

Sapphire: A configurable crypto-processor for post-quantum lattice-based protocols

U Banerjee, TS Ukyab, AP Chandrakasan - arXiv preprint arXiv …, 2019 - arxiv.org
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be
rendered insecure by Shor's algorithm when large-scale quantum computers are built …

Quantum cryptography in 5G networks: a comprehensive overview

M Mehic, L Michalek, E Dervisevic… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …

Applications of distributed ledger technologies to the internet of things: A survey

Q Zhu, SW Loke, R Trujillo-Rasua, F Jiang… - ACM computing surveys …, 2019 - dl.acm.org
Distributed Ledger Technologies (DLTs) and blockchain systems have received enormous
academic, government, and commercial interest in recent years. This article surveys the …

A survey of post-quantum cryptography: Start of a new race

DT Dam, TH Tran, VP Hoang, CK Pham, TT Hoang - Cryptography, 2023 - mdpi.com
Information security is a fundamental and urgent issue in the digital transformation era.
Cryptographic techniques and digital signatures have been applied to protect and …

Post-quantum authentication in TLS 1.3: a performance study

D Sikeridis, P Kampanakis… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
The potential development of large-scale quantum computers is raising concerns among IT
and security research professionals due to their ability to solve (elliptic curve) discrete …

nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data

F Boemer, Y Lao, R Cammarota… - Proceedings of the 16th …, 2019 - dl.acm.org
Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an
attractive remedy to increasing concerns about data privacy in deep learning (DL). However …

Nist post-quantum cryptography-a hardware evaluation study

K Basu, D Soni, M Nabeel, R Karri - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Experts forecast that quantum computers can break classical cryptographic algorithms.
Scientists are developing post quantum cryptographic (PQC) algorithms, that are …