Searched for: +
(1 - 4 of 4)
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
By utilizing the properties of quantum mechanics, quantum computers have the potential to factor a key pair of a large prime number and break some of the core cryptographic primitives that most information infrastructures depend on. This means that today's widely used cryptographic algorithms can soon become unsafe and need to be modified...
journal article 2024
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
The quantum computing-based threats call for a critical information infrastructure to modify widely used cryptographic algorithms to ones that are quantum-safe (QS). Yet, little scholarly research has been undertaken to study QS transition, and the guidance to prepare for socio-technical predicaments of the transition falls short. To address the...
journal article 2023
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
The computation power of quantum computers introduces new security threats in Public Key Infrastructure (PKI), a system used by many governments to secure their digital public services and communication. This calls for an inevitable need for governments to be quantum-safe (QS) by modifying their PKI systems to be resistant to the attacks of...
conference paper 2022
document
Janssen, Annette B.G. (author), de Jager, Victor C.L. (author), Janse, Jan H. (author), Kong, Xiangzhen (author), Liu, S. (author), Ye, Qinghua (author), Mooij, Wolf M. (author)
Ongoing eutrophication frequently causes toxic phytoplankton blooms. This induces huge worldwide challenges for drinking water quality, food security and public health. Of crucial importance in avoiding and reducing blooms is to determine the maximum nutrient load ecosystems can absorb, while remaining in a good ecological state. These so...
journal article 2017
Searched for: +
(1 - 4 of 4)