Quantum Resistant Cryptography and Cyberwarfare

Uloženo v:
Podrobná bibliografie
Vydáno v:International Conference on Cyber Warfare and Security (Mar 2025), p. 71
Hlavní autor: Easttom, Chuck
Vydáno:
Academic Conferences International Limited
Témata:
On-line přístup:Citation/Abstract
Full Text
Full Text - PDF
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!

MARC

LEADER 00000nab a2200000uu 4500
001 3202191270
003 UK-CbPIL
035 |a 3202191270 
045 2 |b d20250301  |b d20250331 
084 |a 142229  |2 nlm 
100 1 |a Easttom, Chuck  |u Vanderbilt University and Georgetown University, USA 
245 1 |a Quantum Resistant Cryptography and Cyberwarfare 
260 |b Academic Conferences International Limited  |c Mar 2025 
513 |a Conference Proceedings 
520 3 |a Quantum computing poses a significant threat to conventional cryptographic systems that rely on the difficulty of mathematical problems such as integer factorization and discrete logarithms. These systems underpin much of the current security infrastructure, including public key cryptography and digital signatures. As quantum computers approach practical viability, there is an urgent need to transition to quantum-resistant cryptographic solutions that can secure digital communications against adversaries equipped with quantum capabilities. This paper explores the landscape of quantumresistant cryptography, focusing on those algorithms that have emerged either as standards or as leading algorithm. Furthermore, the paper examines the progress of standardization efforts, such as the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) initiative, and the implications of deploying these algorithms in existing systems. By addressing the practical considerations for adoption, this study aims to provide a comprehensive overview of the current state and future directions of quantum-resistant cryptography, ensuring robust security in a post-quantum world. 
610 4 |a National Institute of Standards & Technology 
651 4 |a China 
653 |a Cryptography 
653 |a Quantum computing 
653 |a Quantum cryptography 
653 |a Network security 
653 |a Quantum computers 
653 |a Digital signatures 
653 |a Standards 
653 |a Cybersecurity 
653 |a Mathematical functions 
653 |a Mathematics 
653 |a Digital computers 
653 |a Mathematical problems 
653 |a Prime numbers 
653 |a Computers 
653 |a Authentication protocols 
653 |a Fourier transforms 
653 |a Virtual private networks 
653 |a Electronic warfare 
653 |a Algorithms 
653 |a Data encryption 
653 |a Security 
653 |a Public works 
653 |a Standardization 
653 |a Infrastructure 
653 |a Adoption of innovations 
773 0 |t International Conference on Cyber Warfare and Security  |g (Mar 2025), p. 71 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3202191270/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3202191270/fulltext/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3202191270/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch