Author:
Andreou Andreas,Mavromoustakis Constandinos X.,Markakis Evangelos K.,Mastorakis George,Pallis Evangelos,Bourdena Athina
Publisher
Springer Nature Switzerland
Reference39 articles.
1. Andreou, A., Mavromoustakis, C. X., Mastorakis G., Do, D. T., Batalla, J. M., Pallis, E., & Markakis, E. K. (2021). In Towards an optimized security approach to IoT devices with confidential HC data exchange. Multimedia Tools and Applications (Vol. 80, pp. 31435–31449). Springer.
2. Bhatia, V., & Ramkumar, K. R. (2020). An efficient quantum computing technique for cracking RSA using Shor’s algorithm. In 2020 IEEE 5th international conference on computing communication and automation (ICCCA) (pp. 89–94). IEEE.
3. Preston, R. H. (2022). Applying Grover’s algorithm to hash functions: A software perspective. In IEEE transactions on quantum engineering (Vol. 3, pp. 1–10). IEEE.
4. Khalid, A., McCarthy, S., O’Neill, M., & Liu, W. (2019). Lattice-based cryptography for IoT in a quantum world: Are we ready?. In 2019 IEEE 8th international workshop on advances in sensors and interfaces (IWASI) (pp. 194–199). IEEE.
5. Haraty, R. A., Boukhari, B., & Kaddoura, S. (2021). An effective hash-based assessment and recovery algorithm for HC systems. In Arabian journal for science and engineering (pp. 1–14). Springer.