Searched for: +
(1 - 3 of 3)
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
By utilizing the properties of quantum mechanics, quantum computers have the potential to factor a key pair of a large prime number and break some of the core cryptographic primitives that most information infrastructures depend on. This means that today's widely used cryptographic algorithms can soon become unsafe and need to be modified...
journal article 2024
document
Kong, I. (author), Janssen, M.F.W.H.A. (author), Bharosa, Nitesh (author)
The quantum computing-based threats call for a critical information infrastructure to modify widely used cryptographic algorithms to ones that are quantum-safe (QS). Yet, little scholarly research has been undertaken to study QS transition, and the guidance to prepare for socio-technical predicaments of the transition falls short. To address the...
journal article 2023
document
Janssen, Annette B.G. (author), de Jager, Victor C.L. (author), Janse, Jan H. (author), Kong, Xiangzhen (author), Liu, S. (author), Ye, Qinghua (author), Mooij, Wolf M. (author)
Ongoing eutrophication frequently causes toxic phytoplankton blooms. This induces huge worldwide challenges for drinking water quality, food security and public health. Of crucial importance in avoiding and reducing blooms is to determine the maximum nutrient load ecosystems can absorb, while remaining in a good ecological state. These so...
journal article 2017