- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Cryptographic Implementations and Security
- Optical Network Technologies
- IoT and Edge/Fog Computing
- Quantum Mechanics and Applications
- Software-Defined Networks and 5G
- Software System Performance and Reliability
- Advanced Photonic Communication Systems
- Agricultural risk and resilience
- Quantum-Dot Cellular Automata
- Pancasila Values in Education
- Advanced Optical Network Technologies
- Molecular Communication and Nanonetworks
- Education and Character Development
- graph theory and CDMA systems
- Smart Grid Security and Resilience
- Islamic Studies and Radicalism
- IoT Networks and Protocols
- Cryptography and Data Security
- Advanced Wireless Communication Technologies
- Big Data and Digital Economy
- Chaos-based Image/Signal Encryption
Eindhoven University of Technology
2021-2024
The reliance on asymmetric public key cryptography (PKC) and symmetric encryption for cyber-security in current telecommunication networks is threatened by the emergence of powerful quantum computing technology. This due to ability computers efficiently solve problems such as factorization or discrete logarithms, which are basis classical PKC schemes. Thus, assumption that communications secure no longer holds true. Quantum Key Distribution (QKD) post-quantum (PQC) first technologies allow...
Hybrid authenticated key exchange combines cryptography material from different sources (classical, quantum and post-quantum cryptography) to build protocols that are resilient catastrophic failures, technology advances future cryptanalytic attacks. In this work, we propose implement a triple-hybrid version of the transport layer security network protocol TLS 1.3, combining classical cryptography, distribution. We evaluate performance in an experimental scenario our analysis shows...
We present an experimental quantum-resistant OpenSSL-based TLS 1.3 implementation using classical cryptography and QKD. This solution is ideal for high-performance scenarios with optical fiber communication where QKD potential can be leveraged.
We demonstrate the first 92.3-Gbits/s line-rate, end-to-end post-quantum cryptography optical fiber link based on HW accelerators and processing offloading.
This study aims to evaluate the effectiveness of poverty reduction and insurance-based risk protection programs in a particular region, another purpose is analyze impact Insurance on systematic with critical analysis approach. The method used involves survey sample program beneficiary communities as well primary secondary data analysis. Data were collected through interviews, observations, documentation identify program's levels household economic sustainability. results showed that...
This paper proposes a novel architecture for enabling ultra-fast and ultra-safe 6G networks that can support complex challenging real-time applications based on four key technologies: 1) performance prediction, 2) AI-enabled task offloading, 3) quantum machine learning, 4) quantum-resistant communication. With the emergence of where quality experience is prioritized, offloading leverages benefits edge computing. Moreover, execution time be reduced by using computers at or in cloud. In...
With a fully functional point-to-point quantum key distribution link, we demonstrate secret retrieval by pair of encryptors and investigate how their addition impacts network performance indicators on 10 Gbit/s data channel.
Jasadiyah education emphasizes developing the physical, mental, and spiritual aspects of individuals. In context multicultural democratic education, jasadiyah aims to form individuals who have a deep understanding cultural diversity values. The methods used in this include holistic approach that blends intellectual, learning. This is done through introduction concepts such as tolerance, empathy, mutual respect for diversity. also includes students' active participation learning process,...
5G and beyond-5G networks need to support all the traffic pressure by extensive Internet of Things networks. In this document, we review how improve flexibility conducting slicing. We describe four main pillars for transition: mass adoption Software Defined Networking, collocation aggregators at Multi-access Edge Computing platforms, virtualization infrastructure removal Application Functions through distributed responsibilities over network. will present an overview efforts being conducted...
Networking is enabling a continuum comprising cloud, edge and last-mile systems. This allows services applications to join the fabric at any point have access processing power independently of location entrance. To enable this paradigm, we need make sure networking capable transporting network resources seamlessly communication channels that are securitized, ensuring confidentiality integrity data. A challenge in securitization it takes computing away, hence may reduce overall performance....