Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

J Ahn, R Hussain, K Kang, J Son - … Communications Surveys & …, 2025 - ieeexplore.ieee.org
Cryptographic network protocols play a crucial role in enabling secure data exchange over
insecure media in modern network environments. However, even minor vulnerabilities can …

[HTML][HTML] Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption

TL Astrizi, R Custódio - Sensors, 2024 - mdpi.com
We propose a novel solution to streamline the migration of existing Transport Layer Security
(TLS) protocol implementations to a post-quantum Key Encapsulation Mechanism for …

NICE-PAKE: On the Security of KEM-Based PAKE Constructions without Ideal Ciphers

N Alnahawi, J Alperin-Sheriff, D Apon… - Cryptology ePrint …, 2024 - eprint.iacr.org
The interest in realizing generic PQC KEM-based PAKEs has increased significantly in the
last few years. One such PAKE is the CAKE protocol, proposed by Beguinet et al.(ACNS'23) …

SoK: The Engineer's Guide to Post-Quantum Cryptography for Embedded Devices

M Pursche, N Puch, SN Peters, MP Heinl - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Embedded systems are flexible and cost-effective and thus have found a use case in almost
every part of our daily lives. Due to their widespread use, they have also become valuable …

Post-quantum XML and SAML Single Sign-On

J Müller, J Oupický - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract Extensible Markup Language (XML) is one of the most popular serialization
languages. Since many security protocols are built using XML, it also provides cryptographic …

Formal Verification Techniques for Post-quantum Cryptography: A Systematic Review

Y Xu, Z Li, N Dong, V Kuchta, Z Hou, D Liu - International Conference on …, 2025 - Springer
In the quantum computing era, the imperative role of post-quantum cryptography in securing
digital communications has led to the development of computer-aided cryptography …

Qcrypt: Leveraging Post-Quantum Cryptography for Enhanced Security of Data at Rest

A Anand, A Hassabnis - 2024 15th International Conference on …, 2024 - ieeexplore.ieee.org
The cryptographic landscape is undergoing a significant transformation with the integration
of Post-Quantum Cryptography (PQC) algorithms. In today's interconnected world, securing …

An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile Devices

J Renckens, P ROENNE, J GROSZSCHÄDL… - … Conference on Security …, 2024 - orbilu.uni.lu
Noise is a framework for the design and security assessment of Authenticated Key
Exchange (AKE) protocols between two parties using Diffie-Hellman (DH) as the only public …

Fast and Furiously Forward Secret-Symmetric Key Exchange in TLS Pre-Shared Key Mode

J Reimers - 2024 - ntnuopen.ntnu.no
Transport Layer Security (TLS) versjon 1.3 introduserer TLS Pre-Shared Key (PSK) modus
som har potensialet til å redusere tiden det tar å etablere en sikker kommunikasjonskanal …

مروری بر پروتکل امنیتی سیگنال مناسب برای سخت‌افزارهای توان محدود

موسوی - فناوری های نوین مهندسی برق در سیستم انرژی سبز‎ - teeges.isfahan.iau.ir
پیام‌رسان‌های فوری به‌عنوان جایگزینی برای سیستم پیام کوتاه ارزان‌قیمت در دستگاه‌های تلفن
همراه با توان محدود محاسباتی، توسط کاربران جهت ارتباطات خصوصی و تجاری، محبوبیت پیدا …