While the current progress in quantum computing opens new opportunities in a wide range of scientific fields, it poses a serious threat to today?s asymmetric cryptography. New quantum resistant primitives are already available but under active investigation. To avoid the risk of deploying immature schemes we combine them with well-established classical primitives to hybrid schemes, thus hedging our bets. Because quantum resistant primitives have higher resource requirements, the transition to them will affect resource constrained IoT devices in particular. We propose two modifications for the authenticated key establishment process of the industrial machine-to-machine communication protocol OPC UA to make it quantum resistant. Our first var...
The ever-evolving threat landscape of cybersecurity has shown us that no bit of information is secur...
Technology is becoming much more prevalent in the lives of many, mostly in the form of Internet of T...
In light of the emerging threat of powerful quantum computers appearing in the near future, we inves...
While the current progress in quantum computing opens new opportunities in a wide range of scientifi...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security...
Large-scale quantum computers will be able to efficiently solve the mathematical problems of current...
Recent advances in quantum computing are increasingly jeopardizing the security of cryptosystems cur...
A “Post-Quantum Key Exchange ” is needed since the availability of quantum computers that allegedly ...
The continuous development of quantum computing necessitates the development of quantum-resistant cr...
Data protection and information security have been the essence of communication in today's digital e...
We call quantum security the area of IT security dealing with scenarios where one or more parties ha...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
As the role and responsibility of IoT keeps diversifying, its applicability, deployment, and commun...
Quantum computers are becoming a reality in the industrial sector. With the quantum cloud from IBM p...
The ever-evolving threat landscape of cybersecurity has shown us that no bit of information is secur...
Technology is becoming much more prevalent in the lives of many, mostly in the form of Internet of T...
In light of the emerging threat of powerful quantum computers appearing in the near future, we inves...
While the current progress in quantum computing opens new opportunities in a wide range of scientifi...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security...
Large-scale quantum computers will be able to efficiently solve the mathematical problems of current...
Recent advances in quantum computing are increasingly jeopardizing the security of cryptosystems cur...
A “Post-Quantum Key Exchange ” is needed since the availability of quantum computers that allegedly ...
The continuous development of quantum computing necessitates the development of quantum-resistant cr...
Data protection and information security have been the essence of communication in today's digital e...
We call quantum security the area of IT security dealing with scenarios where one or more parties ha...
To ensure uninterrupted cryptographic security, it is important to begin planning the transition to ...
As the role and responsibility of IoT keeps diversifying, its applicability, deployment, and commun...
Quantum computers are becoming a reality in the industrial sector. With the quantum cloud from IBM p...
The ever-evolving threat landscape of cybersecurity has shown us that no bit of information is secur...
Technology is becoming much more prevalent in the lives of many, mostly in the form of Internet of T...
In light of the emerging threat of powerful quantum computers appearing in the near future, we inves...