Downloads: 4 | Views: 89 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper | Computer Science and Information Technology | Singapore | Volume 13 Issue 6, June 2024 | Popularity: 6 / 10
Quantum Computing Applications in Cryptography: Enhancing Security and Identifying Vulnerabilities
Suryanadh Kumar Ganisetti
Abstract: This research explores the applications of quantum computing in cryptography, focusing on new quantum algorithms designed to enhance cryptographic security and the potential vulnerabilities in current cryptographic methods that may arise with the advent of quantum computing. We review recent advancements, propose novel algorithms, and discuss the implications for future cryptographic systems.
Keywords: Quantum Computing, Cryptography, Security, Vulnerabilities, Quantum Algorithms, Post - Quantum Cryptography, Quantum Key Distribution, Cryptographic Protocols, Cybersecurity, Quantum Threats
Edition: Volume 13 Issue 6, June 2024
Pages: 466 - 470
Similar Articles
Downloads: 0
Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024
Pages: 1826 - 1831Automated Penetration Testing using Large Language Models
Dhananjai Sharma, Shria Verma
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, Nepal, Volume 11 Issue 1, January 2022
Pages: 613 - 618Cyber Security, Big Challenges in Nepal and E-Governance
Dr. Shailendra Giri, Resham Giri
Downloads: 2
Research Paper, Computer Science and Information Technology, Kenya, Volume 10 Issue 7, July 2021
Pages: 792 - 797Cyber-Security Vulnerability Assessment Model for County Governments in Kenya
Kadima Victor Chitechi, Kelvin K. Omieno, Samuel Mbugua
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Case Studies, Computer Science and Information Technology, India, Volume 13 Issue 1, January 2024
Pages: 177 - 182Ethical Hacking: Vulnerabilities & Dangers
Chanda Prasad, Dr. Binod Kumar
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 6, June 2024
Pages: 223 - 228Unveiling Vulnerabilities in Serial Printer Point - of - Sale Systems: A Hardware Analysis Approach
Santosh Kumar Kande