Quantum Resistant Cryptography and Cyberwarfare
Uloženo v:
| Vydáno v: | International Conference on Cyber Warfare and Security (Mar 2025), p. 71 |
|---|---|
| Hlavní autor: | |
| Vydáno: |
Academic Conferences International Limited
|
| Témata: | |
| On-line přístup: | Citation/Abstract Full Text Full Text - PDF |
| Tagy: |
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3202191270 | ||
| 003 | UK-CbPIL | ||
| 035 | |a 3202191270 | ||
| 045 | 2 | |b d20250301 |b d20250331 | |
| 084 | |a 142229 |2 nlm | ||
| 100 | 1 | |a Easttom, Chuck |u Vanderbilt University and Georgetown University, USA | |
| 245 | 1 | |a Quantum Resistant Cryptography and Cyberwarfare | |
| 260 | |b Academic Conferences International Limited |c Mar 2025 | ||
| 513 | |a Conference Proceedings | ||
| 520 | 3 | |a Quantum computing poses a significant threat to conventional cryptographic systems that rely on the difficulty of mathematical problems such as integer factorization and discrete logarithms. These systems underpin much of the current security infrastructure, including public key cryptography and digital signatures. As quantum computers approach practical viability, there is an urgent need to transition to quantum-resistant cryptographic solutions that can secure digital communications against adversaries equipped with quantum capabilities. This paper explores the landscape of quantumresistant cryptography, focusing on those algorithms that have emerged either as standards or as leading algorithm. Furthermore, the paper examines the progress of standardization efforts, such as the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) initiative, and the implications of deploying these algorithms in existing systems. By addressing the practical considerations for adoption, this study aims to provide a comprehensive overview of the current state and future directions of quantum-resistant cryptography, ensuring robust security in a post-quantum world. | |
| 610 | 4 | |a National Institute of Standards & Technology | |
| 651 | 4 | |a China | |
| 653 | |a Cryptography | ||
| 653 | |a Quantum computing | ||
| 653 | |a Quantum cryptography | ||
| 653 | |a Network security | ||
| 653 | |a Quantum computers | ||
| 653 | |a Digital signatures | ||
| 653 | |a Standards | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Mathematical functions | ||
| 653 | |a Mathematics | ||
| 653 | |a Digital computers | ||
| 653 | |a Mathematical problems | ||
| 653 | |a Prime numbers | ||
| 653 | |a Computers | ||
| 653 | |a Authentication protocols | ||
| 653 | |a Fourier transforms | ||
| 653 | |a Virtual private networks | ||
| 653 | |a Electronic warfare | ||
| 653 | |a Algorithms | ||
| 653 | |a Data encryption | ||
| 653 | |a Security | ||
| 653 | |a Public works | ||
| 653 | |a Standardization | ||
| 653 | |a Infrastructure | ||
| 653 | |a Adoption of innovations | ||
| 773 | 0 | |t International Conference on Cyber Warfare and Security |g (Mar 2025), p. 71 | |
| 786 | 0 | |d ProQuest |t Political Science Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3202191270/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text |u https://www.proquest.com/docview/3202191270/fulltext/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3202191270/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch |