Author:
Sharma Shagun,Ramkumar K. R.,Kaur Amanpreet,Hasija Taniya,Mittal Sudesh,Singh Bhupendra
Publisher
Springer Nature Singapore
Reference29 articles.
1. Yunakovsky SE, Kot M, Pozhar N, Nabokov D, Kudinov M, Guglya A, Kiktenko EO, Kolycheva E, Borisov A, Fedorov AK (2021) Towards security recommendations for public-key infrastructures for production environments in the post-quantum era. EPJ Quantum Technol, 1–19
2. Gill B, Shailer S (2021) Analysis of security solutions for a post-quantum world
3. Campagna M, LaMacchia B, Ott D (2021) Post quantum cryptography: readiness challenges and the approaching storm
4. Wang S (2021) Research on post-quantum cryptosystem based on IoT devices. J Phys: Conf Ser 1883:1–5.
5. Roy KS, Kalita HK (2019) A survey on post-quantum cryptography for constrained devices. Int J Appl Eng Res, 2608–2615
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cybersecurity Issues and Challenges in Quantum Computing;Topics in Artificial Intelligence Applied to Industry 4.0;2024-04-05
2. Quantum Computing in Pharmaceutical Science;Advances in Computer and Electrical Engineering;2024-01-31
3. The metaverse digital environments: a scoping review of the challenges, privacy and security issues;Frontiers in Big Data;2023-11-23
4. Symmetric Key Cryptography: Review, Algorithmic Insights, and Challenges in the Era of Quantum Computers;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06
5. Key Generation using Curve Fitting for Polynomial based Cryptography;2023 7th International Conference on Trends in Electronics and Informatics (ICOEI);2023-04-11