You are currently on the new version of our website. Access the old version .

126 Results Found

  • Article
  • Open Access
9 Citations
4,439 Views
11 Pages

25 September 2018

In this paper, a new approach to enhance the performance of the interdigital electrode-piezoelectric quartz crystal (IDE-PQC) salt solution concentration sensor by modifying the electrode area of PQC was proposed. Equivalent circuit analysis showed t...

  • Article
  • Open Access
5 Citations
2,534 Views
18 Pages

A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm

  • Muhammad Rashid,
  • Omar S. Sonbul,
  • Sajjad Shaukat Jamal,
  • Amar Y. Jaffar and
  • Azamat Kakhorov

31 December 2024

Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. NTT-based polynomials’ multiplication relies on the computation of forward number theoretic transform (FNTT) and...

  • Perspective
  • Open Access
2 Citations
2,511 Views
10 Pages

30 March 2024

In the last few decades, the traditional paradigm of teleonomy, in which the amino acid sequence of a protein is tightly associated with its structure and, in turn, with its function, has been partially undermined. The idea of a protein as a two-stat...

  • Article
  • Open Access
4 Citations
2,971 Views
14 Pages

10 May 2023

The development of quantum computing systems poses a great threat to the security of existing public key-based systems. As a result, the National Institute of Standards and Technology (NIST) started a Post-Quantum Cryptography (PQC) standardization p...

  • Article
  • Open Access
2 Citations
3,333 Views
23 Pages

23 August 2024

This study introduces a hardware accelerator to support various Post-Quantum Cryptosystem (PQC) schemes, addressing the quantum computing threat to cryptographic security. PQCs, while more secure, also bring significant computational demands, which a...

  • Article
  • Open Access
8 Citations
2,089 Views
17 Pages

Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves

  • Anatoly Bessalov,
  • Volodymyr Sokolov and
  • Serhii Abramov

The article presents the author’s works in the field of modifications and modeling of the Post-Quantum Cryptography (PQC) Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) algorithm on non-cyclic supersingular Edwards curves and its pred...

  • Article
  • Open Access
5 Citations
1,913 Views
17 Pages

With the rapid development of Internet of Things (IoT) technology, the number of IoT users is growing year after year. IoT will become a part of our daily lives, so it is likely that the security of these devices will be an important issue in the fut...

  • Article
  • Open Access
8 Citations
4,990 Views
19 Pages

25 November 2023

The advancement of quantum computing threatens the security of conventional public-key cryptosystems. Post-quantum cryptography (PQC) was introduced to ensure data confidentiality in communication channels, and various algorithms are being developed....

  • Systematic Review
  • Open Access
1,375 Views
16 Pages

2 December 2025

The rapid advancement of quantum computing poses significant threats to classical cryptographic methods, such as Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC), which currently secure Internet of Things (IoT) and cloud...

  • Article
  • Open Access
20 Citations
5,490 Views
26 Pages

19 November 2020

Security of currently deployed public-key cryptography algorithms is foreseen to be vulnerable against quantum computer attacks. Hence, a community effort exists to develop post-quantum cryptography (PQC) algorithms, most notably the NIST PQC standar...

  • Article
  • Open Access
2 Citations
2,473 Views
25 Pages

The emergence of quantum computing and Shor’s algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques. The NIST has responded by standardising Post-Quantum Cryptography (PQC) al...

  • Brief Report
  • Open Access
42 Citations
16,075 Views
12 Pages

16 November 2022

The first week of August 2022 saw the world’s cryptographers grapple with the second shocker of the year. Another one of the four post-quantum cryptography (PQC) algorithms selected by the NIST (National Institute of Standards and Technology) i...

  • Article
  • Open Access
53 Citations
8,517 Views
20 Pages

Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)

  • Jongmin Ahn,
  • Hee-Yong Kwon,
  • Bohyun Ahn,
  • Kyuchan Park,
  • Taesic Kim,
  • Mun-Kyu Lee,
  • Jinsan Kim and
  • Jaehak Chung

19 January 2022

Quantum computing is a game-changing technology that affects modern cryptography and security systems including distributed energy resources (DERs) systems. Since the new quantum era is coming soon in 5–10 years, it is crucial to prepare and de...

  • Article
  • Open Access
13 Citations
4,861 Views
21 Pages

14 October 2020

With the development of the Internet of Things (IoT) and cloud computing technology, various cryptographic systems have been proposed to protect increasing personal information. Recently, Post-Quantum Cryptography (PQC) algorithms have been proposed...

  • Article
  • Open Access
9 Citations
11,789 Views
27 Pages

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

  • Maryam Abbasi,
  • Filipe Cardoso,
  • Paulo Váz,
  • José Silva and
  • Pedro Martins

The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). Thi...

  • Article
  • Open Access
5 Citations
4,275 Views
16 Pages

NTT and Inverse NTT Quantum Circuits in CRYSTALS-Kyber for Post-Quantum Security Evaluation

  • Gyeongju Song,
  • Kyungbae Jang,
  • Siwoo Eum,
  • Minjoo Sim and
  • Hwajeong Seo

16 September 2023

The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through the post-quantum cryptography (PQC) contest. CRYSTALS-Kyber is a lattice-based cipher suite that is used as a PQC stand...

  • Article
  • Open Access
6,556 Views
16 Pages

Owing to the expansion of non-face-to-face activities, security issues in video conferencing systems are becoming more critical. In this paper, we focus on the end-to-end encryption (E2EE) function among the security services of video conferencing sy...

  • Article
  • Open Access
12 Citations
4,615 Views
11 Pages

9 August 2022

The Controller Area Network (CAN) is a bus protocol widely used in Electronic control Units (ECUs) to communicate between various subsystems in vehicles. Insecure CAN networks can allow attackers to control information between vital vehicular subsyst...

  • Article
  • Open Access
109 Citations
33,043 Views
18 Pages

A Survey of Post-Quantum Cryptography: Start of a New Race

  • Duc-Thuan Dam,
  • Thai-Ha Tran,
  • Van-Phuc Hoang,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computer...

  • Article
  • Open Access
2,472 Views
16 Pages

15 July 2025

This study investigates the coupling mechanism between a parabolic notch and dislocations in one-dimensional (1D) hexagonal piezoelectric quasicrystals (PQCs) based on the theory of complex variable functions. By applying perturbation techniques and...

  • Article
  • Open Access
1 Citations
3,510 Views
36 Pages

27 February 2020

At PKC 2008, Plantard et al. published a theoretical framework for a lattice-based signature scheme, namely Plantard–Susilo–Win (PSW). Recently, after ten years, a new signature scheme dubbed the Diagonal Reduction Signature (DRS) scheme...

  • Article
  • Open Access
19 Citations
6,053 Views
17 Pages

The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT h...

  • Article
  • Open Access
997 Views
31 Pages

8 July 2025

This article examines a hybrid generation of cryptographic keys, whose novelty lies in the fusion of a multiscale subkey generation with prime sieve and subkeys inspired by quantum mechanics. It combines number theory with techniques emulated and ins...

  • Article
  • Open Access
6 Citations
7,317 Views
34 Pages

19 November 2024

With the rapid growth of connected vehicles and the vulnerability of embedded systems against cyber attacks in an era where quantum computers are becoming a reality, post-quantum cryptography (PQC) is a crucial solution. Yet, by nature, automotive se...

  • Article
  • Open Access
442 Views
14 Pages

Accelerating Post-Quantum Cryptography: A High-Efficiency NTT for ML-KEM on RISC-V

  • Duc-Thuan Dam,
  • Khai-Duy Nguyen,
  • Duc-Hung Le and
  • Cong-Kha Pham

24 December 2025

Post-quantum cryptography (PQC) is rapidly being standardized, with key primitives such as Key Encapsulation Mechanisms (KEMs) and Digital Signature Algorithms (DSAs) moving into practical applications. While initial research focused on pure software...

  • Review
  • Open Access
10 Citations
4,530 Views
15 Pages

Proteotoxicity: A Fatal Consequence of Environmental Pollutants-Induced Impairments in Protein Clearance Machinery

  • Shweta Devi,
  • Jong-Joo Kim,
  • Anand Prakash Singh,
  • Surendra Kumar,
  • Ashish Kant Dubey,
  • Sandeep Kumar Singh,
  • Ravi Shankar Singh and
  • Vijay Kumar

25 January 2021

A tightly regulated protein quality control (PQC) system maintains a healthy balance between correctly folded and misfolded protein species. This PQC system work with the help of a complex network comprised of molecular chaperones and proteostasis. A...

  • Article
  • Open Access
3 Citations
3,372 Views
34 Pages

A Practical Implementation of Post-Quantum Cryptography for Secure Wireless Communication

  • Babatunde Ojetunde,
  • Takuya Kurihara,
  • Kazuto Yano,
  • Toshikazu Sakano and
  • Hiroyuki Yokoyama

10 June 2025

Recent advances in quantum computing have prompted urgent consideration of the migration of classical cryptographic systems to post-quantum alternatives. However, it is impossible to fully understand the impact that migrating to current Post-Quantum...

  • Article
  • Open Access
3 Citations
3,174 Views
21 Pages

Performance Evaluation of Polypropylene Fiber-Reinforced Pavement Quality Concrete Made with Waste Granite Powder

  • Palanisamy Murthi,
  • Velpula Lavanya,
  • Alireza Bahrami and
  • Kolandasamy Poongodi

This research was conducted to evaluate the influence of waste granite powder (WGP) and polypropylene (PP) fibers on the performance of M35-grade pavement quality concrete (PQC). WGP was mixed in PQC as replacement for cement and was varied from 0% t...

  • Article
  • Open Access
1,951 Views
15 Pages

Integrating and Benchmarking KpqC in TLS/X.509

  • Minjoo Sim,
  • Gyeongju Song,
  • Siwoo Eum,
  • Minwoo Lee,
  • Seyoung Yoon,
  • Anubhab Baksi and
  • Hwajeong Seo

19 September 2025

Advances in quantum computing pose a fundamental threat to classical public-key cryptosystems, including RSA and elliptic-curve cryptography (ECC), which form the foundation for authentication and key exchange in the Transport Layer Security (TLS) pr...

  • Article
  • Open Access
16 Citations
4,259 Views
13 Pages

3 January 2023

Recent work on hybrid quantum-classical machine learning systems has demonstrated success in utilizing parameterized quantum circuits (PQCs) to solve the challenging reinforcement learning (RL) tasks, with provable learning advantages over classical...

  • Proceeding Paper
  • Open Access
1,812 Views
9 Pages

In this study, a parameterized quantum circuit (PQC) is applied for anomaly detection, a crucial process to identify unusual patterns or outliers in data. PQC is a quantum circuit with trainable parameters linked to quantum gates, which are iterative...

  • Article
  • Open Access
1 Citations
2,198 Views
25 Pages

Secure and Scalable File Encryption for Cloud Systems via Distributed Integration of Quantum and Classical Cryptography

  • Changjong Kim,
  • Seunghwan Kim,
  • Kiwook Sohn,
  • Yongseok Son,
  • Manish Kumar and
  • Sunggon Kim

11 July 2025

We propose a secure and scalable file-encryption scheme for cloud systems by integrating Post-Quantum Cryptography (PQC), Quantum Key Distribution (QKD), and Advanced Encryption Standard (AES) within a distributed architecture. While prior studies ha...

  • Review
  • Open Access
12 Citations
4,791 Views
21 Pages

24 December 2022

In the Gram-negative bacteria, many important virulence factors reach their destination via two-step export systems, and they must traverse the periplasmic space before reaching the outer membrane. Since these proteins must be maintained in a structu...

  • Feature Paper
  • Article
  • Open Access
1 Citations
1,925 Views
17 Pages

Hardware Optimized Modular Reduction

  • Alexander Magyari and
  • Yuhua Chen

We introduce a modular reduction method that is optimized for hardware and outperforms conventional approaches. By leveraging calculated reduction cycles and combinatorial logic, we achieve a remarkable 30% reduction in power usage, 27% reduction in...

  • Article
  • Open Access
1 Citations
2,628 Views
18 Pages

Lazy Modular Reduction for NTT

  • Geumtae Kim,
  • Eunyoung Seo,
  • Yongwoo Lee,
  • Young-Sik Kim and
  • Jong-Seon No

11 December 2024

The number theoretic transform (NTT) is a fundamental operation in cryptography, especially for lattice-based cryptographic schemes. This paper introduces LazyNTT, a novel method that reduces the number of Montgomery multiplications required in the N...

  • Article
  • Open Access
31 Citations
7,996 Views
21 Pages

Quantum Random Access Memory for Dummies

  • Koustubh Phalak,
  • Avimita Chatterjee and
  • Swaroop Ghosh

28 August 2023

Quantum Random Access Memory (QRAM) has the potential to revolutionize the area of quantum computing. QRAM uses quantum computing principles to store and modify quantum or classical data efficiently, greatly accelerating a wide range of computer proc...

  • Review
  • Open Access
11 Citations
4,787 Views
22 Pages

Protein Aggregates and Aggrephagy in Myopathies

  • Sara Gibertini,
  • Alessandra Ruggieri,
  • Marta Cheli and
  • Lorenzo Maggi

A number of muscular disorders are hallmarked by the aggregation of misfolded proteins within muscle fibers. A specialized form of macroautophagy, termed aggrephagy, is designated to remove and degrade protein aggregates. This review aims to summariz...

  • Review
  • Open Access
51 Citations
10,350 Views
45 Pages

Medical Image Encryption: A Comprehensive Review

  • Saja Theab Ahmed,
  • Dalal Abdulmohsin Hammood,
  • Raad Farhood Chisab,
  • Ali Al-Naji and
  • Javaan Chahl

11 August 2023

In medical information systems, image data can be considered crucial information. As imaging technology and methods for analyzing medical images advance, there will be a greater wealth of data available for study. Hence, protecting those images is es...

  • Article
  • Open Access
5 Citations
2,496 Views
19 Pages

2 October 2024

In the proposed protocol, a trusted entity interacts with the terminal device of each user to verify the legitimacy of the public keys without having access to the private keys that are generated and kept totally secret by the user. The protocol intr...

  • Article
  • Open Access
2 Citations
1,411 Views
25 Pages

Optimizing SPHINCS+ for Low-Power Devices

  • Alexander Magyari and
  • Yuhua Chen

29 August 2025

Different optimization techniques for the SHAKE variant of SPHINCS+ are explored on an FPGA with the means to find a power-efficient model for resource-constrained devices. This work explores multiple hashing implementations, such as registering inpu...

  • Article
  • Open Access
1 Citations
1,760 Views
18 Pages

Towards a Unified Quantum Risk Assessment

  • Šarūnas Grigaliūnas and
  • Rasa Brūzgienė

22 August 2025

Quantum computing poses an unprecedented threat to classical cryptography, requiring new risk assessment paradigms. This paper proposes a Quantum-Adjusted Risk Score (QARS) model, a theoretical and methodological innovation within the EU’s PARE...

  • Article
  • Open Access
69 Views
23 Pages

Deeply Pipelined NTT Accelerator with Ping-Pong Memory and LUT-Only Barrett Reduction for Post-Quantum Cryptography

  • Omar S. Sonbul,
  • Muhammad Rashid,
  • Muhammad I. Masud,
  • Mohammed Aman and
  • Amar Y. Jaffar

Lattice-based post-quantum cryptography relies on fast polynomial multiplication. The Number-Theoretic Transform (NTT) is the key operation that enables this acceleration. To provide high throughput and low latency while keeping the area overhead sma...

  • Review
  • Open Access
44 Citations
6,823 Views
23 Pages

The Role of HSPB8, a Component of the Chaperone-Assisted Selective Autophagy Machinery, in Cancer

  • Riccardo Cristofani,
  • Margherita Piccolella,
  • Valeria Crippa,
  • Barbara Tedesco,
  • Marina Montagnani Marelli,
  • Angelo Poletti and
  • Roberta M. Moretti

5 February 2021

The cellular response to cancer-induced stress is one of the major aspects regulating cancer development and progression. The Heat Shock Protein B8 (HSPB8) is a small chaperone involved in chaperone-assisted selective autophagy (CASA). CASA promotes...

  • Article
  • Open Access
4 Citations
4,138 Views
15 Pages

Research on Development Progress and Test Evaluation of Post-Quantum Cryptography

  • Meng Zhang,
  • Jing Wang,
  • Junsen Lai,
  • Mingfu Dong,
  • Zhenzhong Zhu,
  • Ryan Ma and
  • Jun Yang

18 February 2025

With the rapid development of quantum computing technology, traditional cryptographic systems are facing unprecedented challenges. Post-Quantum Cryptography (PQC), as a new cryptographic technology that can resist attacks from quantum computers, has...

  • Article
  • Open Access
5 Citations
2,866 Views
14 Pages

The San1 Ubiquitin Ligase Avidly Recognizes Misfolded Proteins through Multiple Substrate Binding Sites

  • Rebeca Ibarra,
  • Heather R. Borror,
  • Bryce Hart,
  • Richard G. Gardner and
  • Gary Kleiger

2 November 2021

Cellular homeostasis depends on robust protein quality control (PQC) pathways that discern misfolded proteins from functional ones in the cell. One major branch of PQC involves the controlled degradation of misfolded proteins by the ubiquitin-proteas...

  • Article
  • Open Access
15 Citations
13,093 Views
23 Pages

Post Quantum Design in SPDM for Device Authentication and Key Establishment

  • Jiewen Yao,
  • Krystian Matusiewicz and
  • Vincent Zimmer

The Security Protocol and Data Model (SPDM) defines a set of flows whose purpose includes the authentication of a computing device’s hardware identity. SPDM also allows for the creation of a secure session wherein data communication between two...

  • Article
  • Open Access
6 Citations
2,037 Views
21 Pages

28 August 2024

This manuscript highlights the mechanical, economical, ecological, and thermal investigations performed on paving quality geopolymer concrete (PQGC) incorporating processed steel slag (PSS) as a substitute for river sand (RSa). The replacement of RSa...

  • Article
  • Open Access
27 Citations
8,131 Views
28 Pages

Protein Quality Control Activation and Microtubule Remodeling in Hypertrophic Cardiomyopathy

  • Larissa M. Dorsch,
  • Maike Schuldt,
  • Cristobal G. dos Remedios,
  • Arend F. L. Schinkel,
  • Peter L. de Jong,
  • Michelle Michels,
  • Diederik W. D. Kuster,
  • Bianca J. J. M. Brundel and
  • Jolanda van der Velden

18 July 2019

Hypertrophic cardiomyopathy (HCM) is the most common inherited cardiac disorder. It is mainly caused by mutations in genes encoding sarcomere proteins. Mutant forms of these highly abundant proteins likely stress the protein quality control (PQC) sys...

of 3