2023
DOI: 10.1080/01969722.2023.2166261
|View full text |Cite
|
Sign up to set email alerts
|

Review of Security Methods Based on Classical Cryptography and Quantum Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(6 citation statements)
references
References 39 publications
0
1
0
Order By: Relevance
“…Quantum computers have the potential to break many of the current cryptographic schemes that rely on the difficulty of certain mathematical problems [35]. Quantum cryptography aims to develop new cryptographic schemes that are resistant to attacks by quantum computers [36].…”
Section: Quantum Cryptographymentioning
confidence: 99%
“…Quantum computers have the potential to break many of the current cryptographic schemes that rely on the difficulty of certain mathematical problems [35]. Quantum cryptography aims to develop new cryptographic schemes that are resistant to attacks by quantum computers [36].…”
Section: Quantum Cryptographymentioning
confidence: 99%
“…This solid structure ensures openness and safety, two features that are vital enabling transactions without confidence in many fields, including supply chain management and banking. Quantum computers' immense processing capabilities have spurred the creation of encryption techniques referred to as afterwards quantum cryptography (Subramani et al 2023). The research emphasizes the importance of adopting cryptographic methods that are secure against quantum computing in order to ensure the security and integrity of block chain networks.…”
Section: Introductionmentioning
confidence: 99%
“…Detection of malevolent nodes [4], that can compromise network security by engaging in malicious activities including eavesdropping [5], tampering with data [6], and launching denial-of-service attacks [7], is one of the primary issues in trust management for IoT networks [8]. Numerous trust management strategies, including reputation-based systems [9], cryptographic methods [10], and machine learning-based methods, have been proposed as solutions to these research challenges.…”
Section: Introductionmentioning
confidence: 99%