Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Kyungbae Jang"'
Publikováno v:
Applied Sciences, Vol 14, Iss 19, p 8579 (2024)
Quantum computers have the capacity to solve certain complex problems more efficiently than classical computers. To fully leverage these quantum advantages, adapting classical arithmetic for quantum systems in a circuit level is essential. In this pa
Externí odkaz:
https://doaj.org/article/b94346b6a324428b90e755f833367c81
Publikováno v:
Mathematics, Vol 12, Iss 9, p 1337 (2024)
Quantum computing advancements pose security challenges for cryptography. Specifically, Grover’s search algorithm affects the reduction in the search complexity of symmetric-key encryption and hash functions. Recent efforts have been made to estima
Externí odkaz:
https://doaj.org/article/7281c7133d5240e78984d405f192280a
Publikováno v:
Applied Sciences, Vol 14, Iss 7, p 2824 (2024)
Security vulnerabilities in the symmetric-key primitives of a cipher can undermine the overall security claims of the cipher. With the rapid advancement of quantum computing in recent years, there is an increasing effort to evaluate the security of s
Externí odkaz:
https://doaj.org/article/9389d7cb972443d29abc7722d30497bb
Publikováno v:
Applied Sciences, Vol 13, Iss 18, p 10373 (2023)
The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC stand
Externí odkaz:
https://doaj.org/article/b9e3324f046d4055b9de167c785c227c
Publikováno v:
IEEE Access, Vol 10, Pp 59661-59674 (2022)
Secure communication is important for Internet of Things (IoT) applications, to avoid cyber-security attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions. Recently, US National I
Externí odkaz:
https://doaj.org/article/4d9cad2a4d5d4347af518f9877e7f38c
Publikováno v:
Sensors, Vol 23, Iss 12, p 5683 (2023)
As IoT technology develops, many sensor devices are being used in our life. To protect such sensor data, lightweight block cipher techniques such as SPECK-32 are applied. However, attack techniques for these lightweight ciphers are also being studied
Externí odkaz:
https://doaj.org/article/e9431fb815b64d6b8643e44f9914e364
Publikováno v:
Applied Sciences, Vol 13, Iss 8, p 5156 (2023)
A quantum computer capable of running the Grover search algorithm, which reduces the complexity of brute-force attacks by a square root, has the potential to undermine the security strength of symmetric-key cryptography and hash functions. Recently,
Externí odkaz:
https://doaj.org/article/23f09a1fdfb84dc9ad9d0f529dc35669
Publikováno v:
Sensors, Vol 23, Iss 6, p 3156 (2023)
The Shor’s algorithm can find solutions to the discrete logarithm problem on binary elliptic curves in polynomial time. A major challenge in implementing Shor’s algorithm is the overhead of representing and performing arithmetic on binary ellipti
Externí odkaz:
https://doaj.org/article/98821a5a33fc40ed9e20c9522af39b9b
Publikováno v:
Applied Sciences, Vol 13, Iss 6, p 3558 (2023)
To build a secure cryptography system in the post-quantum era, one must find the minimum security parameters against quantum attacks by estimating the quantum resources of a fault-tolerant quantum computer. In a fault-tolerant quantum computer, error
Externí odkaz:
https://doaj.org/article/4d7577f8a95346b0b9560e717d69d8e6
Autor:
Minjoo Sim, Siwoo Eum, Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Gyeongju Song, Waikong Lee, Hwajeong Seo
Publikováno v:
Symmetry, Vol 14, Iss 11, p 2377 (2022)
Internet of Things (IoT) technology, in which numerous devices cooperate, has a significant impact on existing industries, such as smart factories, smart cars, and smart cities. Massive learning and computing using data collected through the IoT are
Externí odkaz:
https://doaj.org/article/262f7117eef641c190c62cb1cd400bda