-
1
Progress and Security Analysis of Quantum Cryptography Communication
Published 2015-06-01Subjects: “…quantum cryptography communication…”
Get full text
Article -
2
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01Subjects: “…Post-quantum cryptography (PQC)…”
Get full text
Article -
3
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01Get full text
Article -
4
A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography
Published 2025-01-01Subjects: Get full text
Article -
5
Breaking barriers in two-party quantum cryptography via stochastic semidefinite programming
Published 2025-01-01Get full text
Article -
6
FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber
Published 2022-02-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
7
-
8
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…In this article, we present a flexible continuous-wave quantum cryptography scheme for Internet of Things systems. …”
Get full text
Article -
9
Analysis of the amplitude form of the quantum hash function
Published 2023-11-01Subjects: “…quantum cryptography…”
Get full text
Article -
10
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01Subjects: Get full text
Article -
11
Breaking the HFEM public key scheme
Published 2013-03-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
12
Generalized Centered Binomial Distribution for Bimodal Lattice Signatures
Published 2025-01-01Subjects: “…Post-quantum cryptography…”
Get full text
Article -
13
CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm
Published 2024-07-01Subjects: Get full text
Article -
14
Quantum public-key encryption protocol based on single-photon
Published 2014-11-01Subjects: Get full text
Article -
15
Survey of digital signature technology based on error correcting codes
Published 2016-11-01Subjects: Get full text
Article -
16
Study of secret sharing schemes based on quantum theory
Published 2009-01-01Subjects: Get full text
Article -
17
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01Subjects: Get full text
Article -
18
-
19
Compact software/hardware co-design and implementation method of Aigis-sig digital signature scheme
Published 2021-04-01Subjects: “…post-quantum cryptography…”
Get full text
Article -
20
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01Subjects: “…post-quantum cryptography…”
Get full text
Article