Author:
Salloum Hadi,Alawir Murhaf,Alatasi Mohammad Anas,Asekrea Saleem,Mazzara Manuel,Bahrami Mohammad Reza
Publisher
Springer Nature Switzerland
Reference28 articles.
1. Nurhadi, A.I., Syambas, N.R.: Quantum key distribution (QKD) protocols: a survey. In: 2018 4th International Conference on Wireless and Telematics (ICWT), pp. 1–5. IEEE (2018)
2. Huang, A., Barz, S., Andersson, E., Makarov, V.: Implementation vulnerabilities in general quantum cryptography. New J. Phys. 20(10), 103016 (2018)
3. Vaishnavi, A., Pillai, S.: Cybersecurity in the quantum era-a study of perceived risks in conventional cryptography and discussion on post quantum methods. J. Phys. Conf. Ser. 1964(4), 042002 (2021)
4. Balamurugan, C., Singh, K., Ganesan, G., Rajarajan, M.: Post-quantum and code-based cryptography-some prospective research directions. Cryptography 5(4), 38 (2021)
5. Ugwuishiwu, C.H., Orji, U.E., Ugwu, C.I., Asogwa, C.N.: An overview of quantum cryptography and Shor’s algorithm. Int. J. Adv. Trends. Comput. Sci. Eng. 9(5), 1–9 (2020)