4.7 Article

Quantum-resistant Transport Layer Security

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet

Yuan Cao et al.

Summary: Quantum key distribution (QKD) is a symmetric secret key negotiation protocol that ensures information-theoretic security. With the development of QKD networks, they have been applied in various fields and successfully implemented in practice. QKD networks consist of multiple nodes connected by optical fiber or free space links, enabling the distribution of secret keys to multiple users.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Computer Science, Information Systems

Tackling Denial of Service Attacks on Key Management in Software-Defined Quantum Key Distribution Networks

Miralem Mehic et al.

Summary: This paper proposes a novel solution for designing a Key Management System resistant to DoS attacks. The solution allows applications to function securely in environments with fewer keys.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges

Van-Linh Nguyen et al.

Summary: 6G mobile networks need to address diverse threats in a space-air-ground integrated network environment, with security and privacy issues still largely conceptual. Lessons learned from existing security architectures reveal new threat vectors from new technologies, with promising techniques like physical layer protection, quantum-safe communications, and AI security to mitigate attack magnitude.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2021)

Article Computer Science, Information Systems

Quantum Secured Internet Transport

Bernardo A. Hubermann et al.

INFORMATION SYSTEMS FRONTIERS (2020)

Article Engineering, Electrical & Electronic

The Engineering of Software-Defined Quantum Key Distribution Networks

Alejandro Aguado et al.

IEEE COMMUNICATIONS MAGAZINE (2019)

Article Computer Science, Information Systems

Cryptography Standards in Quantum Time: New Wine in an Old Wineskin?

Lidong Chen

IEEE SECURITY & PRIVACY (2017)

Review Multidisciplinary Sciences

Post-quantum cryptography

Daniel J. Bernstein et al.

NATURE (2017)

Article Computer Science, Information Systems

A Survey of Man In The Middle Attacks

Mauro Conti et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Computer Science, Theory & Methods

The random oracle model: a twenty-year retrospective

Neal Koblitz et al.

DESIGNS CODES AND CRYPTOGRAPHY (2015)

Review Optics

Secure quantum key distribution

Hoi-Kwong Lo et al.

NATURE PHOTONICS (2014)

Article Multidisciplinary Sciences

Fundamental rate-loss tradeoff for optical quantum key distribution

Masahiro Takeoka et al.

NATURE COMMUNICATIONS (2014)

Review Physics, Multidisciplinary

The security of practical quantum key distribution

Valerio Scarani et al.

REVIEWS OF MODERN PHYSICS (2009)

Review Physics, Multidisciplinary

Heisenberg's uncertainty principle

Paul Busch et al.

PHYSICS REPORTS-REVIEW SECTION OF PHYSICS LETTERS (2007)