4.4 Article

Post-Quantum Adversarial Modeling: A User's Perspective

Related references

Note: Only part of the references are listed.
Editorial Material Computer Science, Hardware & Architecture

Quantum-Safe Trust for Vehicles: The Race Is Already On

Michael Gardiner et al.

COMMUNICATIONS OF THE ACM (2021)

Article Computer Science, Hardware & Architecture

The Complex Path to Quantum Resistance

Atefeh Mashatan et al.

COMMUNICATIONS OF THE ACM (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Layering Quantum-Resistance into Classical Digital Signature Algorithms

Teik Guan Tan et al.

Summary: The paper highlights the vulnerability of current asymmetric key cryptographic systems to quantum computer attacks and proposes a novel approach using zero-knowledge proofs to enhance quantum resistance. This approach extends the encryption protection of data to the post-quantum era and is easy to migrate.

INFORMATION SECURITY (ISC 2021) (2021)

Proceedings Paper Computer Science, Information Systems

Quantum Computing Threat Modelling on a Generic CPS Setup

Cher Chye Lee et al.

Summary: The threat of quantum computers is real and existing encryption systems are vulnerable. It is essential to use appropriate modeling methods to evaluate and mitigate threats to ensure the security of systems.

APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021 (2021)

News Item Computer Science, Hardware & Architecture

The Quantum Threat

Gregory Mone

COMMUNICATIONS OF THE ACM (2020)

Article Computer Science, Hardware & Architecture

The Tyranny of Urgency

George F. Hurlburt

COMPUTER (2019)

Article Computer Science, Hardware & Architecture

Practical Annealing-Based Quantum Computing

Catherine C. McGeoch et al.

COMPUTER (2019)

Article Computer Science, Hardware & Architecture

Consumer Applications of Quantum Computing A promising approach for secure computation, trusted data storage, and efficient applications

Travis Humble

IEEE CONSUMER ELECTRONICS MAGAZINE (2018)

Article Computer Science, Information Systems

Quantum Computing: Codebreaking and Beyond

Martin Roetteler et al.

IEEE SECURITY & PRIVACY (2018)

Proceedings Paper Computer Science, Information Systems

On Attacker Models and Profiles for Cyber-Physical Systems

Marco Rocchetto et al.

COMPUTER SECURITY - ESORICS 2016, PT II (2016)