Downloads: 6 | Views: 123 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Analysis Study Research Paper | Computer Science and Information Technology | Singapore | Volume 13 Issue 6, June 2024 | Popularity: 5.8 / 10
Quantum Computing Applications in Cryptography: Enhancing Security and Identifying Vulnerabilities
Suryanadh Kumar Ganisetti
Abstract: This research explores the applications of quantum computing in cryptography, focusing on new quantum algorithms designed to enhance cryptographic security and the potential vulnerabilities in current cryptographic methods that may arise with the advent of quantum computing. We review recent advancements, propose novel algorithms, and discuss the implications for future cryptographic systems.
Keywords: Quantum Computing, Cryptography, Security, Vulnerabilities, Quantum Algorithms, Post - Quantum Cryptography, Quantum Key Distribution, Cryptographic Protocols, Cybersecurity, Quantum Threats
Edition: Volume 13 Issue 6, June 2024
Pages: 466 - 470
DOI: https://www.doi.org/10.21275/SR24605170901
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024
Pages: 1295 - 1298Real-Time Data Processing and Analysis in MIS: Challenges and Solutions
Dhruv K Singhal
Downloads: 0
Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024
Pages: 1826 - 1831Automated Penetration Testing using Large Language Models
Dhananjai Sharma, Shria Verma
Downloads: 0
Informative Article, Computer Science and Information Technology, India, Volume 11 Issue 1, January 2022
Pages: 1644 - 1646Best Practices for Logs and Metrics in Software Development
Krishna Mohan Pitchikala
Downloads: 0
Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 4, April 2023
Pages: 1936 - 1940Zero Trust Network Segmentation
Anvesh Gunuganti
Downloads: 0
Research Paper, Computer Science and Information Technology, United States of America, Volume 8 Issue 6, June 2019
Pages: 2454 - 2456Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools
Satheesh Reddy Gopireddy