Author:
Sankaran Janani,Arumugam Chandrasekar
Publisher
Springer Science and Business Media LLC
Reference37 articles.
1. Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., Pereira, J.L.: Advances in quantum cryptography. Adv. Opt. Photon. 12(4), 1012–1236 (2020)
2. Peng, C., Chen, J., Zeadally, S., He, D.: Isogeny-based cryptography: a promising post-quantum technique. IT Prof. 21(6), 27–32 (2019)
3. Taraskin, O., Soukharev, V., Jao, D., LeGrow, J.T.: Towards isogeny-based password-authenticated key establishment. J. Math. Cryptol. 15(1), 18–30 (2020)
4. Sagar Hossen, M., Tabassum, T., Ashiqul Islam, M., Karim, R., Rumi, L.S., Kobita, A.A.: Digital signature authentication using asymmetric key cryptography with different byte number. In: Evolutionary Computing and Mobile Sustainable Networks: Proceedings of ICECMSN 2020. Springer Singapore, pp. 845–851 (2021)
5. Dey, K., Debnath, S.K., Stănică, P., Srivastava, V.: A post-quantum signcryption scheme using isogeny based cryptography. J. Inf. Secur. Appl. 69, 103280 (2022)