top of page

Search
![[Research] Enhancing Cyber Security with Post-Quantum Cryptography: An Empirical Validation and Practical Application](https://static.wixstatic.com/media/de513c_595963cb52cb4f898ed6a0ef16df0494~mv2.png/v1/fill/w_333,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/de513c_595963cb52cb4f898ed6a0ef16df0494~mv2.webp)
![[Research] Enhancing Cyber Security with Post-Quantum Cryptography: An Empirical Validation and Practical Application](https://static.wixstatic.com/media/de513c_595963cb52cb4f898ed6a0ef16df0494~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_avif,quality_auto/de513c_595963cb52cb4f898ed6a0ef16df0494~mv2.webp)
[Research] Enhancing Cyber Security with Post-Quantum Cryptography: An Empirical Validation and Practical Application
This paper empirically validates the theoretical frameworks presented in "A Quantum Technology Adoption Framework" [2] and "Why QRNG Confuses PQC" [3]. We conducted a series of file encryption and decryption experiments using NIST-standardized Post-Quantum Cryptography (PQC) algorithms on a defined dataset of PDF and large-scale video files. The performance metrics, including speed and throughput for various KEM and digital signature algorithms (ML-KEM, ML-DSA, Falcon, SPHINC
7 days ago
bottom of page


