Author:
Seyhan Kübra,Akleylek Sedat
Funder
Türkiye Bilimsel ve Teknolojik Araştırma Kurumu
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference59 articles.
1. D’Anvers JP, Karmakar A, Roy SS, Vercauteren F. Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM. In: International Conference on Cryptology in Africa, pp. 282-305, Springer, Cham (2018)
2. MacKenzie P . The PAK suite: Protocols for password-authenticated key exchange. a P1363. submission to the IEEE P1363 Working Group, (2002)
3. Dharminder D, Reddy CB, Das AK, Park Y, Jamal SS (2022). Post-Quantum Lattice Based Secure Reconciliation Enabled Key Agreement Protocol for IoT. IEEE Internet of Things Journal
4. Kumar U, Garg M, Kumari S, Dharminder D (2023) A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication. Trans Emerg Telecommun Technol 34(1):e4660
5. Ott D, Peikert C (2019) “Identifying research challenges in post quantum cryptography migration and cryptographic agility,” arXiv preprint arXiv:1909.07353
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献