-
1
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
Published 2024-12-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
2
Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption
Published 2024-11-01Subjects: “…hybrid post-quantum cryptography…”
Get full text
Article -
3
Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
Published 2024-01-01Subjects: “…Post-quantum cryptography…”
Get full text
Article -
4
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
Published 2024-01-01Subjects: Get full text
Article -
5
Quantum vs post‐quantum security for future networks: Survey
Published 2024-01-01Subjects: “…Post-Quantum Cryptography…”
Get full text
Article -
6
Secured Real-Time Machine Communication Protocol
Published 2024-12-01Subjects: Get full text
Article -
7
Breaking the HFEM public key scheme
Published 2013-03-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
8
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight
Published 2023-01-01Subjects: “…Post-quantum cryptography…”
Get full text
Article -
9
Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process
Published 2024-11-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
10
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
Published 2025-01-01Subjects: “…Post-quantum cryptography…”
Get full text
Article -
11
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
Published 2025-01-01Subjects: Get full text
Article -
12
Hyperledger Fabric-Based Post Quantum Cryptography for Healthcare Application Using Discrete Event Simulation
Published 2024-01-01Subjects: Get full text
Article -
13
CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm
Published 2024-07-01Subjects: Get full text
Article -
14
Survey of digital signature technology based on error correcting codes
Published 2016-11-01Subjects: Get full text
Article -
15
Performance and Efficiency Evaluation of M-SIDH
Published 2024-01-01Subjects: Get full text
Article -
16
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01Subjects: Get full text
Article -
17
Acceleration of modular arithmetic in post-quantum signature schemes
Published 2024-11-01Subjects: “…lattices, post-quantum cryptography, reduction algorithm, multiplication of polynomials, quotient ring.…”
Get full text
Article -
18
Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme
Published 2021-04-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
19
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
20