Science topic
Cryptography - Science topic
A topic for the discussion of research into Cryptography and Cryptanalysis.
Publications related to Cryptography (10,000)
Sorted by most recent
Unmanned Aerial Vehicles (UAVs) are increasingly recognized for their pivotal role in military and civilian applications, serving as essential technology for transmitting, evaluating, and gathering information. Unfortunately, this crucial process often occurs through unsecured wireless connections, exposing it to numerous cyber-physical attacks. Fu...
Key refreshing is a pragmatic countermeasure to side-channel attacks, designed to revoke and replace the key promptly when an attack is either anticipated or suspected. This system-level approach rekeys the device under attack and keeps paired devices protected if cryptography secures data in transit. The frequency of key refreshing is critical: to...
An efficient and highly secure method of secret message cryptography will be presented which based on the principle of playing cards shuffling. The method will be implemented in a selected number of layers, each layer will encrypt-decrypt the input message using its own private key (PK), the output of any layer can be taken as a final encrypted-dec...
Diabetic Retinopathy (DR), a diabetes-related eye condition, damages retinal blood vessels and can lead to vision loss if undetected early. Precise diagnosis is challenging due to subtle, varied symptoms. While classical deep learning (DL) models like CNNs and ResNet’s are widely used, they face resource and accuracy limitations. Quantum computing,...
The proliferation of Internet of Things (IoT) devices, coupled with the threat of quantum computing, demands robust cryptographic frameworks for resource-constrained environments. This research proposes a Java-based adaptive quantum-resilient cryptography framework for IoT ecosystems. Utilizing post-quantum algorithms like Lattice-based Cryptograph...
Article History: Received Revised Accepted DOI: This review explores the latest advancements in securing Wireless Sensor Networks (WSNs), emphasizing the challenges stemming from their distinct architecture and resource limitations. It highlights the growing significance of artificial intelligence (AI) and machine learning (ML) in tackling these is...
The emergence of quantum computing poses a critical threat to classical cryptographic mechanisms, particularly within resource-constrained mobile platforms. This paper presents a novel artificial intelligence-based framework for the dynamic and context-aware selection of post-quantum cryptographic (PQC) algorithms, aimed at enhancing mobile applica...
We introduce a novel numerical system based on multi-plicatively independent sequences. Given any base T = (qi)i, the corresponding set is defined as NT = {q n 1 1 · · · q n k k | ni ≥ 0, k ≥ 1}. This construction is extended to dynamic bases that evolve over time through iterative matrix transformations, leading to a time-dependent family Tt. We p...
In the present paper, we study post-quantum security properties of one block ciphers mode of operation called Disk Encryption with Counter (DEC). In Russian Federation, the DEC mode was standardized in the end of 2022. The purpose of the DEC mode is encryption of information stored on block-oriented storage devices. We define a notion of stateful t...
In the digital age, images permeate every facet of our lives, often carrying critical information for organizations, institutions, and even nation-states. Ensuring their security against unauthorized access is paramount. This research introduces a novel image encryption algorithm designed to safeguard the integrity and confidentiality of sensitive...
Digital forensics functions optimally due to the combined factors of intact log data and their easy accessibility. The conventional logging systems create major reliability concerns because they remain susceptible to altering, deleting and modifying information. The research evaluates how blockchain technology enhances log management systems by cre...
A criptografia presente desde a antiguidade com o intuito do envio de mensagens que somente o remetente e o destinatário pudessem compreender, para tanto, a criptografia foi evoluindo, desde a cifra de César até os dias atuais com os computadores. Assim, o presente trabalho visa primordialmente a abordagem da matemática de forma contextualizada no...
This work introduces a supersymmetric (SUSY) extension of the Deutsch–Jozsa algorithm, leveraging superqubits and supergates to enhance quantum computational efficiency. We present a theoretical framework for SUSY-based quantum information processing, demonstrating how superqubit manipulation via supergates preserves the exponential speedup of the...
Quantum technologies are transforming industries by harnessing the principles of quantum mechanics. These innovations promise to revolutionize computing, communi cations, sensing, cryptography, and healthcare, offering solutions previously considered unattainable. Quantum computing is changing the way complex problems are solved: un like classical...
As a popular decentralized and distributed database exhibiting transparency and unforgeability, blockchain has received widespread attention. At the time of writing, its security hinges on classical cryptography, which maintains a high grade of security by exploiting the potentially excessive computational complexity of mathematical problems to be...
The Feistel Boomerang Connectivity Table (\(\textrm{FBCT}\)), which is the Feistel version of the Boomerang Connectivity Table (\(\textrm{BCT}\)), plays a role in analyzing block ciphers’ ability to withstand strong attacks, such as boomerang attacks. However, as of now, only four classes of power functions are known to have explicit values for all...
The next generation of technology is rooted in quantum-based advancements. The entangled photon pair sources play a pivotal role in a wide range of advanced quantum applications, including quantum high precision sensors, communication, computing, cryptography and so on. Scalable on-chip quantum photonic devices have the potential to drive game chan...
The automated data collection system (ADCS) represents a thorough framework that is designed to tackle diverse data management issues within social enterprises. The ADCS implements data collection and analysis methods that are an accurate, secure, and scalable system utilizing automation and advanced cryptographic security while aligning with the S...
Keywords: integer, rational, cryptography, blockchain, physics, quantum computing, natural language, diophantine equations, single-failure falsifiability, constructivism, +12 dimensions, AI.
ABSTRACT
The DAOF method provides an epistemological and computational framework for understanding natural language through discrete mathematics and physical...
Article History: DOI: With the growth and expansion of information technology, the issue of security in cloud networks has become increasingly significant. Today, security is considered one of the most important challenges in cloud computing technology and is actively studied by researchers. The most crucial step in ensuring security is identifying...
CRYSTALS-Kyber has been standardized by the National Institute of Standards and Technology (NIST) as a quantum-resistant algorithm in the post-quantum cryptography (PQC) competition. The bottleneck in performance of Kyber is the polynomial multiplication based on Number Theoretic transform (NTT). This work presents two parallel architectures adopti...
This paper explores how blockchain technology can enhance security and privacy in the Internet of Things (IoT). The increasing number of connected devices in IoT has led to various challenges, including data security, user authentication, and resistance to cyberattacks. blockchain, with its features such as decentralization, advanced cryptography,...
Bit Flipping Key Encapsulation (BIKE) is a code-based cryptosystem that was considered in Round 4 of the NIST Post-Quantum Cryptography Standardization process. It is based on quasi-cyclic moderate-density parity-check (QC-MDPC) codes paired with an iterative decoder. While (low-density) parity-check codes have been shown to perform well in practic...
Runtime verification offers scalable solutions to improve the safety and reliability of systems. However, systems that require verification or monitoring by a third party to ensure compliance with a specification might contain sensitive information, causing privacy concerns when usual runtime verification approaches are used. Privacy is compromised...
As the digital landscape advances, the need for robust security mechanisms in the transmission and authentication of data, particularly in financial sectors, becomes increasingly critical. This progressive data transmission and authentication scheme leveraging advanced blockchain cryptography for the protection of financial assets across decentrali...
This article examines the evolution of cryptologic techniques and their implications for public and private security, focusing on the Italian and EU legal frameworks. It explores the roles of cryptography, steganography, and quantum technologies in countering cybersecurity threats, emphasising the need for robust legislation to address emerging cha...
The multi-UAV relay system can rapidly deploy a temporary communication network in disaster emergency communication scenarios to enhance communication coverage and stability in the affected area and ensure the efficient transmission of rescue information. Aiming at the problems of insufficient real-time performance, low user fairness, and low utili...
Keywords: integer, rational, complex, arbitrary-length, prime numbers, cryptography, physics, quantum computing, pocket temperatures, diophantine equations, single-failure falsifiability, constructivism, +12 dimensions, AI.
ABSTRACT
This work argues that physical reality is fundamentally discrete with +12 dimensions, and best described through rat...
Noisy intermediate-scale quantum cryptanalysis focuses on the capability of near-term quantum devices to solve the mathematical problems underlying cryptography, and serves as a cornerstone for the design of post-quantum cryptographic algorithms. For the shortest vector problem (SVP), which is one of the computationally hard problems in lattice-bas...
In this paper, we propose a novel symmetric key encryption scheme inspired by modular traversal of Ananta-Graphs. The system utilizes an iterative traversal mechanism over modular arithmetic to generate a shared secret key between communicating parties without directly exchanging private information. By leveraging the predictable yet secure path ge...
We develop a generalized framework for invariant-based cryptography by extending the use of structural identities as core cryptographic mechanisms. Starting from a previously introduced scheme where a secret is encoded via a four-point algebraic invariant over masked functional values, we broaden the approach to include multiple classes of invarian...
Blockchain is a very attractive technology because it provides a public, append-only, immutable, and ordered transaction log. Blockchain systems are inherently interdisciplinary as they combine different fields such as cryptography, multi-agent systems, distributed systems, social systems, economics, and finance. Additionally, they have a highly ac...
Data is typically encrypted before transmission to a cloud server to safeguard user privacy. However, such encryption prevents the server from performing searches on the data, necessitating the introduction of novel cryptographic primitives, such as public key encryption with multi-ciphertext equality test (PKEMET). PKEMET allows the cloud server t...
This paper explores the foundational principles, technological implementations, algorith-mic innovations, and emerging applications of quantum computing. By leveraging quantum-mechanical phenomena such as superposition and entanglement, quantum computers offer unprecedented computational capabilities for solving specific complex problems. We examin...
To introduce a post-quantum-secure encryption scheme specifically for use in flight-computers, we used avionics’ module-isolation methods to wrap a recent encryption standard (HPKE-Hybrid Public Key Encryption) within a software partition. This solution proposes an upgrade to HPKE, using quantum-resistant ciphers (Kyber/ML-KEM and Dilithium/ML-DSA)...
The proliferation of digital technologies has resulted in the creation of a great deal of cryptographic techniques for the safe transfer and storage of private information. There is a widespread application of the SHA-256 technique, which is a cryptographical hash function, to verify the validity, identity, and integrity of data. In this research,...
Keçeci Numbers (first defined: July 27, 2022) constitute a unique numerical system that generates sequences based on specific initial conditions and a set of iterative rules. This system relies on a complex interplay of fundamental arithmetic operations (addition), special divisibility rules (periodically dividing by 2 or 3), and the primality prop...
The National Institute of Standards and Technology (NIST) has recently concluded the third round of its Post Quantum Cryptography Standardization Process, selecting four finalist algorithms for standardization: CRYSTALS Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. These algorithms are designed to withstand attacks from both classical and quantu...
In popular democratic countries, the voting system plays an important part during choosing the right government. Electronic voting machines are less secure with regard to data, time consuming and need further workforce to avoid illegal casting of votes. The proposed system have a secured authentication method with a multibiometric system integratin...
Abstract:
This research paper explores the evolving landscape of quantum computing with a focus on the development of next-generation algorithms, advanced cryptographic protocols, and secure quantum network architectures. As classical systems approach their computational limits, quantum computing offers exponential speedups for complex problem-solv...
In today’s digital world, keeping data safe is a top priority. Two common methods used to protect data are steganography and cryptography. Steganography hides secret data within everyday files (like images, GIFs or videos), while cryptography scrambles the data into an unreadable format. This paper introduces a new way to hide data using a techniqu...
The concept of minimal linear codes was introduced by Ashikhmin and Barg in 1998, leading to the development of various methods for constructing these codes over finite fields. In this context, minimality is defined as a codeword u in a linear code \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepac...
Data security is a critical aspect of e-Campus services, which manage student information. However, the risks of data breaches and hacking pose significant challenges, undermining user trust. This study aims to optimize student data security by implementing multiple cryptographic methods that combine Advanced Encryption Standard (AES) and Rivest-Sh...
Cryptography is, among other things, about sending secret messages that can only be read by the intended recipient. In this paper, we will cover encryption and decryption, or encoding and decoding of messages, hashing, and digital signatures. Cryptography is now extensively used to protect data that is traveling across the internet. We can say that...
The Lenstra-Lenstra-Lovász (LLL) algorithm, known as one of the main algorithms to decrypt the ciphertext encrypted by Lattice-based cryptography, outputs short basis vectors for n dimensional vectors represented by n × n matrix. One of the indicators that determine the quality of this LLL algorithm is the average number of the LLL bases, and there...
One-way functions are essential tools for cryptography. However, the existence of one-way functions is still an open conjecture. By constructing a function with classical bits as input and quantum states as output, we prove the existence of quantum one-way functions more rigorously. It provides theoretical guarantees for the security of many quantu...
The Internet of Things (IoT) is a vibrant idea in information and communication technology. Secure communication within the networks for the Internet of Things under adversarial situations requires suitable key agreement among communicating parties towards performing encryption and authentication. IoT security requires distributed key management an...
Information security is a fundamental principle during data transmission. The main threat to information security is hacking. They are focusing on finding new techniques to breach encryption methods. Therefore, developing new approaches for hiding information against hacker attacks is a potential solution. Different steganography methods are availa...
Powerline Communication (PLC) has become an integral component of modern smart grid infrastructures and Internet of Things (IoT) ecosystems due to its cost-efficiency and ubiquity. However, as PLC systems increasingly incorporate Artificial Intelligence (AI) and cloud-based architectures, they are also exposed to new and evolving cybersecurity thre...
Recently, the practice of Chebyshev polynomials in public-key system design has been recommended. In fact, they have certain satisfying chaotic features that make them appropriate for usage in cryptography. Thereby, various public-key cryptosystem employing Chebyshev polynomials has been focused however, the successive analysis has revealed its ins...
Resorting to cloud computing for spectral graph analysis on large-scale graph data is becoming increasingly popular. However, given the intrusive and opaque natures of cloud services, privacy, and misbehaving cloud that returns incorrect results have raised serious concerns. Current schemes are proposed for privacy alone under the semi-honest model...
This thesis is a compilation of my work over about 4 decades, starting in 1986. Some works have been presented in conferences and published sometimes partially only, others have been presented ion conferences and voluntarily not published, and finally some have not been presented neither published at all.
The advent of quantum computing poses a significant threat to classical cryptographic systems, necessitating the development of quantum-resistant algorithms. This study presents a predictive analysis framework leveraging machine learning techniques to evaluate the performance and resilience of post-quantum cryptographic algorithms. Various supervis...
Quantum Error Correction Codes (QECCs) are essential for mitigating errors in Noisy Intermediate-Scale Quantum (NISQ) devices, which are prone to decoherence and operational imperfections. This study evaluates the performance of various QECCs, including surface codes, stabilizer codes, and low-density parity-check (LDPC) codes, in the context of NI...
Quantum computing poses a significant threat to classical cryptographic systems, necessitating the adoption of post-quantum cryptographic (PQC) algorithms resistant to quantum attacks. However, quantum and classical implementations of these algorithms remain vulnerable to errors due to decoherence, noise, and operational faults. Quantum error corre...
The impending advent of quantum computing poses a significant threat to classical cryptographic systems, necessitating the development of robust post-quantum cryptographic (PQC) solutions. This research presents a novel machine learning-based framework designed to enhance the security of PQC algorithms by detecting anomalies, optimizing parameter s...
We propose a new symmetric cryptographic scheme based on functional invariants defined over discrete oscillatory functions with hidden parameters. The scheme encodes a secret integer through a four-point algebraic identity preserved under controlled parameterization. Security arises not from algebraic inversion but from structural coherence: the tr...
The internet of medical things (IoMT) integrates various sensors, smart devices, and fully utilizes medical data to provide high-quality medical services through the Internet of Things (IoT). Smart medical devices can be cross-domain shared in IoMT to provide health monitoring, disease diagnosis, rehabilitation training, etc. In IoMT, conventional...
The healthcare industry faces escalating cybersecurity threats, particularly targeting identity and access management (IAM) systems reliant on vulnerable password-based authentication. This paper proposes a next-generation solution leveraging passkeys, based on FIDO2 and WebAuthn protocols, to establish a passwordless authentication framework. We e...
As image processing systems proliferate, privacy concerns intensify given the sensitive personal information contained in images. This paper examines privacy challenges in image processing and surveys emerging privacy-preserving techniques including differential privacy, secure multiparty computation, homomorphic encryption, and anonymization. Key...
Technological developments have driven digitalization in online business transactions, including the use of electronic signatures (ETS) as a substitute for conventional signatures. Although ETS have been legally recognized in the Electronic Information and Transactions Law (UU ITE), there is still debate regarding their authentication, legal force,...
Quantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems. In this paper, we conduct a comprehensive security evaluation of QKD-based solutions, focusing on real-world use cases sourced from academic literature and indust...
These days, both industry and academics have paid significant attention to the Internet of Things (IoT). It
enables connections between people and things at anytime, anywhere, with anything, and with everyone, preferably via
any path, network, or service. One vision for the future is that IoT develops into a utility with improved sensing,
actuation...
This systematic review provides a comprehensive analysis of modern software security mechanisms and their alignment with sustainable development objectives. Drawing upon 20 peer-reviewed studies from IEEE, ACM, and Springer sources (2022-2024), the investigation employs PRISMA methodology to evaluate cryptographic systems, access control models, an...
This paper critically examines the evolution, implementation, and effectiveness of Zero Trust Architecture (ZTA) from 2020 to 2025, focusing on Zero Trust 2.0 advancements. Through a systematic analysis of 87 industry case studies, technical implementations, and security incident reports across diverse sectors, this research provides comprehensive...
Most modern cryptographic systems, such as RSA and the Diffie-Hellman Key Exchange, rely on "trapdoor" mathematical functions that are presumed to be computationally difficult with existing tools. However, quantum computers will be able to break these systems using Shor's Algorithm, necessitating the development of quantum-resistant alternatives. W...
The rapid increase of internet of things (IoT) devices in our daily lives has highlighted the critical need for strong security measures to protect the integrity and confidentiality of IoT communications. This paper presents a novel solution to this growing problem using a secure and lightweight DNA-based encryption method, elliptic curve encryptio...
In this paper, we present a new formalism, the Field Tensor Network Integral Logical Operator (FTNILO), to obtain the explicit equation that returns the minimum, maximum, and zeros of a multivariable injective function, and an algorithm for non-injective ones. This method extends the MeLoCoToN algorithm for inversion and optimization problems with...
As the Indian judicial system has a very massive number of case backlogs and document mismanagement, there was a need of something that is secure and tamper proof. This paper presents a blockchain based eVault solution that is tailored according to the Indian law firms in a decentralised way. Using blockchain technology the system ensures integrity...
The conditional disclosure of secrets (CDS) setting is among the most basic primitives studied in information-theoretic cryptography. Motivated by a connection to non-local quantum computation and position-based cryptography, CDS with quantum resources has recently been considered. Here, we study the differences between quantum and classical CDS, w...
Quantum computing threatens the security foundations of consumer electronics (CE). Preparing the diverse CE ecosystem, particularly resource-constrained devices, for the post-quantum era requires quantitative understanding of quantum-resistant cryptography (PQC) performance. This paper presents a comprehensive cross-platform performance analysis of...
In any wireless network, security is a critical consideration. Various protocols are being developed to provide security in ad hoc networks, ensuring that data and networks are protected from numerous threats and assaults. The MANET's main difficulties include providing effective quality of service (QoS), security, resource reuse and path optimisat...
This article presents a formal proof that P ̸= NP, resolving one of the Clay
Mathematics Institute’s Millennium Prize Problems. We introduce self-referential
complexity, a measure of the computational cost when a deterministic algorithm
verifies its own states. Applying this to the NP-complete Boolean Satisfiability
Problem (SAT), we demonstrate th...
Federated Learning (FL) enables collaborative model training while preserving data privacy, but its classical cryptographic underpinnings are vulnerable to quantum attacks. This vulnerability is particularly critical in sensitive domains like healthcare. This paper introduces PQS-BFL (Post-Quantum Secure Blockchain-based Federated Learning), a fram...
The Post-Quantum Lightweight Key Sharing Protocol for Secure MQTT-Based IoT Networks (PQLKS-MQTT) addresses the critical need for quantum-resistant and resource-efficient security in IoT communications. As the proliferation of IoT devices continues, securing MQTT-based networks against evolving threats, including quantum attacks, becomes imperative...
Variable-order differential operators can be useful for modeling chaotical systems and nonlinear. This paper introduces a novel discrete fractional-order q-deformed Stefanski map and investigates its dynamical properties, stability, synchronization, and cryptographic applications. The study begins the incorporation of q-deformation and fractional-o...
Kyber is a lattice-based key encapsulation mechanism selected for standardization by the NIST Post-Quantum Cryptography (PQC) project. A critical component of Kyber's key generation process is the sampling of matrix elements from a uniform distribution over the ring Rq . This step is one of the most computationally intensive tasks in the scheme, si...
Smart home technologies have revolutionized modern living by enhancing convenience, efficiency, and security. In contrast, many interconnected devices introduce significant security and privacy challenges. This comprehensive review investigates the integration of blockchain technology as a robust solution for secure access control in smart home env...
The rapid technological advancements of the 21st century have ushered in next-generation computing, offering unprecedented scalability and real-time processing capabilities. This paper explores emerging computing paradigms-such as quantum computing, edge computing, and AI-driven architectures-and the challenges of transitioning from traditional sys...
A two-dimensional switching-controlled hyperchaotic system has been developed that enhances the randomness of the system through dynamic switching of the control parameter. The proposed hyperchaotic system is then applied to image encryption. The encryption process begins with the decomposition of the plaintext image matrix into an upper triangular...
Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures, addressing previously inaccessible threats, and improving cryptographic efficiency. Key research a...
The rapid growth of internet of things (IoT) applications, especially in wireless sensor networks (WSNs), has led to the generation of large amounts of real-time data from interconnected devices. This growth leads to challenges in securing data access and managing resources efficiently. To address these challenges, we propose a dynamic trust-based...
In 2021, Sterner proposed a commitment scheme based on supersingular isogenies. For this scheme to be binding, one relies on a trusted party to generate a starting supersingular elliptic curve of unknown endomorphism ring. In fact, the knowledge of the endomorphism ring allows one to compute an endomorphism of degree a power of a given small prime....
This paper introduces two innovative third-order recurrence sequences: the generalized Jacobsthal-Narayana sequence and the co-Jacobsthal-Narayana sequence. It examines their interrelated properties, including Binet's formulas, generating functions, Simson's formulas, and matrix representations, as well as their special subsequences. The study high...
As smart cities, autonomous vehicles, and space systems become increasingly interconnected and reliant on advanced technologies, their cybersecurity needs grow more complex and critical. The advent of quantum computing and artificial intelligence (AI) introduces both unprecedented opportunities and significant threats to these infrastructures. Quan...
The development of quantum computing technologies represents a critical risk for virtually all classical encryption systems (RSA, AES, ECC) and cybersecurity will sustain immense damage. RSA and AES in total depend on modern cyber security as they use factoring and discrete logarithm problems whose solving is perilous via quantum algorithms like Sh...
This discussion explored the integration of creative thinking pedagogy and the anthropological theory of didactics in university-level algebra education, emphasizing the importance of understanding the perspectives of both learners and teachers. The work began by highlighting the necessity of considering these viewpoints to create effective and res...
The Elliptic Curve Cryptography (ECC) is one of the most prominent Asymmetric-based cryptosystems as it affords a higher level of security with small keys. According to National Institute of Standards and Technology (NIST), ECC gains the smallest secure key over the binary curve. In literature, the best field over binary curves is Lopez-Dahab (LD)...
We tackle the problem of enumerating set-theoretic solutions to the Yang-Baxter equation. This equation originates from statistical and quantum mechanics, but also has applications in knot theory, cryptography, quantum computation and group theory. Non-degenerate, involutive solutions have been enumerated for sets up to size 10 using constraint pro...
This thesis introduces a unified, sovereign architecture for cognitive AI agents through the lens of recursive identity, quantum-informed cognition, and offline-first multi-agent systems. Building on an original 1998 philosophical thesis, it reframes general intelligence as a field-based, weighted, and recursive process rather than a static model o...
The intersection of adversarial artificial intelligence (AI) and quantum computing presents a formidable challenge to cybersecurity, particularly in the protection of Security Operations Centers (SOCs) managing critical infrastructures such as IoT networks, satellite communication systems, and emerging deepfake threats. Adversarial AI techniques ex...
With rising demands of smart appliances with normal locations transforming themselves in smart cities, internet-of-things (IoT) encounters various evolving security challenges. The frequently adopted encryption-based approaches have its own limitation of identifying dynamic threats while artificial intelligence (AI) based methodologies are found to...
The rapid evolution of artificial intelligence (AI) and quantum computing presents both unprecedented opportunities and significant security challenges for satellite communications and smart city infrastructures. As these critical systems increasingly rely on interconnected networks and AI-driven technologies, they become vulnerable to sophisticate...
As encryption demands at the edges grow, volatile switching devices have emerged as promising candidates for entropy sources because of their inherent stochastic properties, offering fast, energy‐efficient operation and a minimal footprint. Although most studies have focused on exploiting inherent stochasticity, efforts to analyze and optimize thes...
CRYSTALS-Kyber was chosen to be the standardized key encapsulation mechanisms (KEMs) out of the finalists in the third round of the National Institute of Standards and Technology (NIST) post-quantum cryptography (PQC) standardization program. Since the number theoretic transform (NTT) was used to reduce the computational complexity of polynomial mu...
This paper describes a constant-time lattice encoder for the National Institute of Standards and Technology (NIST) recommended post-quantum encryption algorithm: Kyber. The first main contribution of this paper is to refine the analysis of Kyber decoding noise and prove that Kyber decoding noise can be bounded by a sphere. This result shows that th...
The convergence of Shor's algorithm, a groundbreaking quantum computing method for factoring large integers, with adversarial artificial intelligence (AI) represents a transformative shift in cybersecurity for Security Operations Centers (SOCs), smart cities, and autonomous systems. As cyber threats become increasingly sophisticated, adversarial AI...
From autonomous transportation and energy grids to healthcare and surveillance systems, the seamless integration of digital technologies demands a new paradigm of cybersecurity-one that can effectively respond to the scale, speed, and complexity of modern threats. This paper explores how the convergence of Quantum Computing, Shor's Algorithm, and A...
Cloud computing has transformed organizational data handling, processing, and storage by providing flexible, scal-able, and affordable resources accessible anytime and anywhere. With ongoing movement of businesses and people alike towards the cloud for operations, apprehension about safeguarding sensitive data and secure access has increased dramat...