2023
DOI: 10.3390/s23218744
|View full text |Cite
|
Sign up to set email alerts
|

Post-Quantum Security: Opportunities and Challenges

Silong Li,
Yuxiang Chen,
Lin Chen
et al.

Abstract: Cryptography is very essential in our daily life, not only for confidentiality of information, but also for information integrity verification, non-repudiation, authentication, and other aspects. In modern society, cryptography is widely used; everything from personal life to national security is inseparable from it. With the emergence of quantum computing, traditional encryption methods are at risk of being cracked. People are beginning to explore methods for defending against quantum computer attacks. Among … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 103 publications
0
3
0
Order By: Relevance
“…[58] proposed the Supersingular Isogeny Key Encapsulation (SIKE) algorithm for FPGA platforms, its relevance in the post-quantum cryptography landscape, and the importance of FPGA in cryptographic applications, particularly for IoT devices. [59] provided a broad overview of the transition to post-quantum security, identifying both opportunities and challenges that arise from this shift.…”
Section: Post-quantum and Cryptographic Methodsmentioning
confidence: 99%
“…[58] proposed the Supersingular Isogeny Key Encapsulation (SIKE) algorithm for FPGA platforms, its relevance in the post-quantum cryptography landscape, and the importance of FPGA in cryptographic applications, particularly for IoT devices. [59] provided a broad overview of the transition to post-quantum security, identifying both opportunities and challenges that arise from this shift.…”
Section: Post-quantum and Cryptographic Methodsmentioning
confidence: 99%
“…The emergence of quantum computing and quantum information theory has opened up new horizons for steganography [4]. Quantum computing, with its revolutionary processing power and cryptographic implications, introduces an intriguing challenge and opportunity for data security [5]. In this quantum frontier, quantum steganography is born.…”
Section: Introductionmentioning
confidence: 99%
“…In October 2019, Google announced the completion of a 53-qubit quantum computer. In November 2022, IBM announced the successful implementation of the Osprey quantum processor, capable of processing 433 qubits, and plans to release a processor with a memory volume of 4158 qubits in 2025 [1,2].…”
Section: Introductionmentioning
confidence: 99%