References
Abbas, T. N. A., Hameed, R., Kadhim, A. A., and Qasim, N. H. (2024). Artificial intelligence and criminal liability: exploring the legal implications of ai-enabled crimes.
Encuentros. Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico., (22 ), 140-159.
https://doi.org/10.5281/zenodo.13386675
Ahn, J., Kwon, H.-Y., Ahn, B., Park, K., Kim, T., Lee, M.-K., Kim, J., et al. (2022). Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD).
Energies, 15 (3).
https://doi.org/10.3390/en15030714.
Aizpurua, B., Bermejo, P., Martinez, J. E., and Orus, R. (2023). Hacking Cryptographic Protocols with Advanced Variational Quantum Attacks.
arXiv preprint arXiv:2311.02986.
https://doi.org/10.48550/arXiv.2311.02986
Cheng, J. K., Lim, E. M., Krikorian, Y. Y., Sklar, D. J., and Kong, V. J. (2021). A Survey of Encryption Standard and Potential Impact Due to Quantum Computing. 2021 IEEE Aerospace Conference (50100), 6-13 March 2021.
https://doi.org/10.1109/AERO50100.2021.9438392.
Dharani, D., Soorya, R. M., Kumari, K. A. . (2023). Quantum Resistant Cryptographic Systems for Blockchain Network.
2023 3rd International Conference on Intelligent Technologies (CONIT), 23-25 June.
https://doi.org/10.1109/CONIT59222.2023.10205646.
Eich, B., Grote, O., and Ahrens, A. (2023). A Quantum-Safe Public-Key-Algorithms Approach with Lattice-Based Scheme.
2023 International Interdisciplinary PhD Workshop (IIPhDW), 3-5 May.
https://doi.org/10.1109/IIPhDW54739.2023.10124431.
Farooq, S., Altaf, A., Iqbal, F., Thompson, E. B., Vargas, D. L., Díez, I. D., and Ashraf, I. (2023). Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms.
Sensors, 23 (12).
https://doi.org/10.3390/s23125379.
Faruk, M. J. H., Tahora, S., Tasnim, M., Shahriar, H., and Sakib, N. (2022). A Review of Quantum Cybersecurity: Threats, Risks and Opportunities.
2022 1st International Conference on AI in Cybersecurity (ICAIC), 24-26 May.
https://doi.org/10.1109/ICAIC53980.2022.9896970.
Iyer, V. V., and Yilmaz, A. E. (2021). Using the ANOVA F-Statistic to Rapidly Identify Near-Field Vulnerabilities of Cryptographic Modules.
2021 IEEE MTT-S International Microwave Symposium (IMS), 7-25 June.
https://doi.org/10.1109/IMS19712.2021.9575028.
Joshi, S., Bairwa, A. K., Pljonkin, A. P., Garg, P., and Agrawal, K. (2023). From Pre-Quantum to Post-Quantum RSA.
Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security, Larache, Morocco.
https://doi.org/10.1145/3607720.3607721
Khlaponin, Y., Izmailova, O., Krasovska, H., Krasovska, K., Bodnar, N., and Abbas, S. Q. (2024). Base of Models of the Information Security Risks Assessment System.
2024 35th Conference of Open Innovations Association (FRUCT). https://doi.org/10.23919/FRUCT61870.2024.10516397.
Mashatan, A., and Heintzman, D. (2021). The Complex Path to Quantum Resistance: Is your organization prepared?
Queue, 19 (2), Pages 20.
https://doi.org/10.1145/3466132.3466779
Pedone, I., Atzeni, A., Canavese, D., and Lioy, A. (2021). Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment.
IEEE Access, 9, 115270-115291.
https://doi.org/10.1109/ACCESS.2021.3102313
Qasim, N., Jawad, A., and Majeed, M. (2023). The Usages of Cybersecurity in Marine Communications.
Transport Development, 3 (18).
https://doi.org/10.33082/td.2023.3-18.05
Qasim, N. H., Jumaa, D. A., Rahim, F., Jawad, A. M., Khaleefah, A. M., Zhyrov, G., and Ali, H. (2024). Simplifying IP multimedia systems by introducing next-generation networks with scalable architectures.
Edelweiss Applied Science and Technology, 8 (4), 2042-2054.
https://doi.org/10.55214/25768484.v8i4.1580
Qasim, N. H., Vyshniakov, V., Khlaponin, Y., and Poltorak, V. (2021). Concept in information security technologies development in e-voting systems.
International Research Journal of Modernization in Engineering Technology and Science (IRJMETS), 3 (9), 40-54.
https://www.irjmets.com/uploadedfiles/paper/volume_3/issue_9_september_2021/15985/final/fin_irjmets1630649545.pdf
Raya, J. E., Yahya, A. S., and Ahmad, E. K. (2023). Protection from A Quantum Computer Cyber-Attack: survey.
Technium: Romanian Journal of Applied Sciences and Technology, 5, 1-12.
https://doi.org/10.47577/technium.v5i.8293
Rodas, R. N. P., Lin, Y. D., Lu, S. L., and Chang, K. J. (2021). O2MD²: A New Post-Quantum Cryptosystem With One-to-Many Distributed Key Management Based on Prime Modulo Double Encapsulation.
IEEE Access, 9, 109260-109288.
https://doi.org/10.1109/ACCESS.2021.3100551
Septien-Hernandez, J.-A., Arellano-Vazquez, M., Contreras-Cruz, M. A., and Ramirez-Paredes, J.-P. (2022). A Comparative Study of Post-Quantum Cryptosystems for Internet-of-Things Applications.
Sensors, 22 (2).
https://doi.org/10.3390/s22020489.
Solanki, B., and Saini, A. (2023). Review Paper on Quantum Computing and Quantum Cryptography.
International Journal of Advanced Research in Science, Communication and Technology, 7-13.
https://doi.org/10.48175/IJARSCT-10712
Tom, J. J., Anebo, N. P. Onyekwelu, B. A.,, and Wilfred, A., Eyo, R. E. (2023). Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems.
International Journal of Engineering and Advanced Technology, 12 (5), 25-38.
https://doi.org/10.35940/ijeat.E4153.0612523
Venkatesh, R., and Hanumantha, B. S. (2023). A Privacy-Preserving Quantum Blockchain Technique for Electronic Medical Records.
IEEE Engineering Management Review, 51 (4), 137-144.
https://doi.org/10.1109/EMR.2023.3319376
Wang, J.-Y., Chang, X., and Wang, H. J. (2023). How to use Classical Operation in Digital Bits to Simulate Quantum Bits for the RSA Cryptosystem.
Advanced Computer Science and Information Technology Trends, 367-376.
https://doi.org/10.5121/csit.2023.131328
Yang, Y.-H., Li, P.-Y., Ma, S.-Z., Qian, X.-C., Zhang, K.-Y., Wang, L.-J., Zhang, W.-L., et al. (2021). All optical metropolitan quantum key distribution network with post-quantum cryptography authentication.
Optics Express, 29 (16), 25859-25867.
https://doi.org/10.1364/OE.432944
Yousif, O., Dawood, M., Jassem, F. T., and Qasim, N. H. (2024). Curbing crypto deception: evaluating risks, mitigating practices and regulatory measures for preventing fraudulent transactions in the middle east.
Encuentros: Revista de Ciencias Humanas, Teoría Social y Pensamiento Crítico, (22), 311-334.
https://doi.org/10.5281/zenodo.13732337
Yu, Y. (2021). Preface to special topic on lattice-based cryptography.
National Science Review, 8 (9), nwab154.
https://doi.org/10.1093/nsr/nwab154
Zapatero, V., van Leent, T., Arnon-Friedman, R., Liu, W.-Z., Zhang, Q., Weinfurter, H., and Curty, M. (2023). Advances in device-independent quantum key distribution.
npj Quantum Information, 9 (1), 10.
https://doi.org/10.1038/s41534-023-00684-x
Zhang, Q., Ayoub, O., Wu, J., Lin, X., and Tornatore, M. (2023). IC-QKD: An Information-Centric Quantum Key Distribution Network.
IEEE Communications Magazine, 61 (12), 148-154.
https://doi.org/10.1109/MCOM.004.2200763