Filters








70 Hits in 6.5 sec

Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards [article]

Markku-Juhani O. Saarinen
2020 arXiv   pre-print
Standardization of Post-Quantum Cryptography (PQC) was started by NIST in 2016 and has proceeded to its second elimination round.  ...  The upcoming standards are intended to replace (or supplement) current RSA and Elliptic Curve Cryptography (ECC) on all targets, including lightweight, embedded, and mobile systems.  ...  Post-Quantum Standardization and Transition In August 2015 the U.S.  ... 
arXiv:1912.00916v4 fatcat:ie2z75cgnjgpncgqbt2z5ydrtq

MobileCloud 2020 Table of contents

2020 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud)  
Upcoming NIST Post-Quantum Cryptography Standards 23 Markku-Juhani Saarinen (PQShield Ltd.)  ...  Napoli Federico II), Alessio Botta (University of Napoli Federico II), and Giorgio Ventre (University of Napoli Federico II) Session 2: Energy-saving mobile cloud Mobile Energy Requirements of the  ... 
doi:10.1109/mobilecloud48802.2020.00004 fatcat:djlawqzjibbazhkhlhjdlyqriy

An overview of cryptographic primitives for possible use in 5G and beyond

Jing Yang, Thomas Johansson
2020 Science China Information Sciences  
AbstractThis survey overviews the potential use of cryptographic primitives in the fifth-generation mobile communications system (aka 5G) and beyond.  ...  It discusses the new security challenges that come with 5G and presents the upcoming security architecture.  ...  Recently, NIST has initiated an effort to standardize post-quantum cryptography (PQC) [66] .  ... 
doi:10.1007/s11432-019-2907-4 fatcat:bdapglaflnc75mzmmlxcb64veq

FPGA-based Digital Quantum Coprocessor

Valerii Hlukhov, Lviv Polytechnic National University, Computer Engineering Department, Bohdan Havano
2018 Advances in Cyber-Physical Systems  
It is based on (almost strongly) universal-2 families of hash functions and requires short shared secret keys. X.509: The defacto standard format for a digital certificate.  ...  7 Quantum Safe Cryptography and Security 8 2 Overview What is cryptography and how is it used? Cryptography is literally the art of "secret writing".  ...  From these examples, it is clear that some forms of symmetric key cryptography are guaranteed to be an important example of secure cryptography in a post-quantum world.  ... 
doi:10.23939/acps2018.02.067 fatcat:7txboogyr5f5vgc5c5zzbovv34

The Roadmap to 6G Security and Privacy

Pawani Porambage, Gurkan Gur, Diana Pamela Moya Osorio, Madhusanka Liyanage, Andrei Gurtov, Mika Ylianttila
2021 IEEE Open Journal of the Communications Society  
(VLC), THz, and quantum computing.  ...  We also give the reader some insights into the standardization efforts and research-level projects relevant to 6G security.  ...  The paper reflects only the authors' views. The Commission is not responsible for any use that may be made of the information it contains. A.  ... 
doi:10.1109/ojcoms.2021.3078081 fatcat:r5g662rcxjcgvjfc2el3lesdzy

Survey of Promising Technologies for Quantum Drones and Networks

Adarsh Kumar, Surbhi Bhatia, Keshav Kaushik, Manjula Gandhi, Gayathri Devi, Diego Pacheco, Arwa Mashat
2021 IEEE Access  
PQC is a branch of cryptography that focuses on asymmetric cryptography. As per a NIST study [3] , quantum computers with cryptography capabilities are expected to debut around 2030.  ...  The large quality and availability of the facilities projected by mobile networks have created a tradeoff with great standards.  ... 
doi:10.1109/access.2021.3109816 fatcat:gkyevfoqrfertef7j7gjzcstii

Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges [article]

Pietro Tedeschi and Savio Sciancalepore and Roberto Di Pietro
2022 arXiv   pre-print
strategies, and quantum-based key distribution schemes.  ...  Specifically, we classify the literature on security for SATCOM systems into two main branches, i.e., physical-layer security and cryptography schemes.  ...  As a result, recent commercial and standardization activities clearly indicate SATCOMs as one of the most important enabling technologies for supporting the development of the upcoming sixth-generation  ... 
arXiv:2112.11324v3 fatcat:jhzalhfnt5gppbetfdzy35fxrq

A survey of Key bootstrapping protocols based on Public Key Cryptography in the Internet of Things

Manisha Malik, Maitreyee Dutta, Jorge Granjal
2019 IEEE Access  
In this paper, we survey the state of the art in key bootstrapping protocols based on public-key cryptography in the Internet of Things.  ...  INDEX TERMS Authentication, Internet of Things, key bootstrapping, key management, public key cryptography, security.  ...  and post-quantum cryptography to support key bootstrapping.  ... 
doi:10.1109/access.2019.2900957 fatcat:fbpg4ydg55bg5okyljo67hycqq

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
the failures of existing security architectures and state-of-the-art defenses.  ...  First, other than inheriting vulnerabilities from the previous generations, 6G has new threat vectors from new radio technologies, such as the exposed location of radio stripes in ultra-massive MIMO systems  ...  Remaining challenges 1 https://csrc.nist.gov/projects/post-quantum-cryptography Fig. 15 . Energy consumption of the cryptographic algorithms, according to [158] .  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Quantum Technology for Military Applications [article]

Michal Krelina
2021 arXiv   pre-print
This report provides a basic overview of quantum technologies under development, also estimating the expected time scale of delivery or the utilisation impact.  ...  Quantum technologies are dual-use technologies, and as such are of interest to the defence and security industry and military and governmental actors.  ...  The author is also grateful for the minor comments to the first preprint and valuable suggestions and journal reviewers' comments.  ... 
arXiv:2103.12548v2 fatcat:wfoyemxkvzgg5pbt6btzkl4jjy

Quantum technology for military applications

Michal Krelina
2021 EPJ Quantum Technology  
This report provides a basic overview of quantum technologies under development, also estimating the expected time scale of delivery or the utilisation impact.  ...  Quantum technologies are dual-use technologies, and as such are of interest to the defence and security industry and military and governmental actors.  ...  The author is also grateful for the minor comments to the first preprint and valuable suggestions and journal reviewers' comments.  ... 
doi:10.1140/epjqt/s40507-021-00113-y fatcat:3nuu3r5jwjaade4ck2srxjaahm

The Road Towards 6G: A Comprehensive Survey [article]

Wei Jiang, Bin Han, Mohammad Asif Habibi, Hans Dieter Schotten
2021 arXiv   pre-print
As of today, the fifth generation (5G) mobile communication system has been rolled out in many countries and the number of 5G subscribers already reaches a very large scale.  ...  Second, the technical requirements of 6G are discussed and compared with those of 5G with respect to a set of KPIs in a quantitative manner.  ...  An example of symmetric cryptography that is widely used today is advanced encryption standard (AES), which has been standardized in 2001 by National Institute of Standards and Technology (NIST) for confidentiality  ... 
arXiv:2102.01420v1 fatcat:7pexxlo3pjfwlls6dl4lvh77iq

The Road Towards 6G: A Comprehensive Survey

Wei Jiang, Bin Han, Mohammad Asif Habibi, Hans Dieter Schotten
2021 IEEE Open Journal of the Communications Society  
As of today, the fifth generation (5G) mobile communication system has been rolled out in many countries and the number of 5G subscribers already reaches a very large scale.  ...  Second, the technical requirements of 6G are discussed and compared with those of 5G with respect to a set of KPIs in a quantitative manner.  ...  Consequently, the research and development of quantum-resistant cryptographic algorithms and technologies, also called post-quantum cryptography, which are secure against both quantum and classical computers  ... 
doi:10.1109/ojcoms.2021.3057679 fatcat:egt7bnw6x5a55kced2zw6j374y

News briefs

1993 Journal of Research of the National Institute of Standards and Technology  
At the request of state of Maryland officials ,and the attending physician, a team of NIST scientists conducted post-accident radiation measurements at the facility.  ...  moment, to the free energy of the mbcture.  ...  The Standard Reference Materials Program announces the availability of three multielement solutions to meet these requirements, in addition to the full 3100 series of single-element calibration solutions  ... 
doi:10.6028/jres.098.023 fatcat:5k2ryewd4rewfezwzktgni3wzq

Applications of Lasers for Tactical Military Operations

Hemani Kaushal, Georges Kaddoum
2017 IEEE Access  
Besides the communication aspect, the highly directive nature of a laser beam is also used as a directed energy laser weapon.  ...  The advancement of laser communication for military purposes and its current state of the art is reviewed as well as some recent scientific developments in the area of high-energy directed laser weapons  ...  Nowadays, with the development of quantum physics, military organizations are carrying out a lot of research in quantum cryptography communications.  ... 
doi:10.1109/access.2017.2755678 fatcat:swj4r2xxe5hovnfhmqtro5t4wy
« Previous Showing results 1 — 15 out of 70 results