Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Post-quantum security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Post-quantum security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Post-quantum security"
V M, Thafzy, and Dr Nikesh P. "A Comparative Study of Hybrid Cryptographic Systems: Integrating Classical and Post-Quantum Cryptographic Techniques for Comprehensive Post-Quantum Security." International Journal of Research Publication and Reviews 6, no. 3 (2025): 962–70. https://doi.org/10.55248/gengpi.6.0325.1128.
Der volle Inhalt der QuelleRanjita and Gautam Kumar Rajput Dr. "Cryptanalysis of pre-quantum and post-quantum cryptography." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 650–54. https://doi.org/10.5281/zenodo.13643131.
Der volle Inhalt der QuelleLi, Silong, Yuxiang Chen, Lin Chen, et al. "Post-Quantum Security: Opportunities and Challenges." Sensors 23, no. 21 (2023): 8744. http://dx.doi.org/10.3390/s23218744.
Der volle Inhalt der QuelleAbdulwahhab, Saba Alaa, Qasim Mohammed Hussien, and Imad Fakhri Al-Shaikhli. "An overview of number theory research unit variant development security." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1164–73. https://doi.org/10.11591/ijeecs.v28.i2.pp1164-1173.
Der volle Inhalt der QuelleChen, Yiheng. "Quantum Security: An Overview of Quantum Cryptography." Theoretical and Natural Science 109, no. 1 (2025): 73–78. https://doi.org/10.54254/2753-8818/2025.gl23411.
Der volle Inhalt der QuelleMüller, Johannes, and Jan Oupický. "Post-quantum XML and SAML Single Sign-On." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.
Der volle Inhalt der QuelleSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Der volle Inhalt der QuelleCultice, Tyler, and Himanshu Thapliyal. "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security." Information 13, no. 8 (2022): 382. http://dx.doi.org/10.3390/info13080382.
Der volle Inhalt der QuelleJohanna, Barzen, and Leymann Frank. "Post-Quantum Security: Origin, Fundamentals, and Adoption." Trends in Computer Science and Information Technology 9, no. 3 (2024): 106–28. https://doi.org/10.17352/tcsit.000089.
Der volle Inhalt der QuelleHosoyamada, Akinori. "On post-quantum security of symmetric cryptosystems." IEICE ESS Fundamentals Review 17, no. 1 (2023): 59–71. http://dx.doi.org/10.1587/essfr.17.1_59.
Der volle Inhalt der QuelleDissertationen zum Thema "Post-quantum security"
Wilson, Freya Louise. "A solution for post quantum security using existing communications infrastructures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/20820/.
Der volle Inhalt der QuelleMagnusson, Olof, and Mats Hurtig. "Post-Quantum Public Key Cryptography for the Internet of Things." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40459.
Der volle Inhalt der QuelleDeneuville, Jean-Christophe. "Contributions à la cryptographie post-quantique." Thesis, Limoges, 2016. http://www.theses.fr/2016LIMO0112/document.
Der volle Inhalt der QuelleBonnoron, Guillaume. "A journey towards practical fully homomorphic encryption." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0073/document.
Der volle Inhalt der QuelleBindel, Nina [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Douglas [Akademischer Betreuer] Stebila. "On the Security of Lattice-Based Signature Schemes in a Post-Quantum World / Nina Bindel ; Johannes Buchmann, Douglas Stebila." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1169825729/34.
Der volle Inhalt der QuelleSchrottenloher, André. "Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS271.
Der volle Inhalt der QuelleZhang, Zheng. "The Singularity Attack on Himq-3: A High-Speed Signature Scheme Based on Multivariate Quadratic Equations." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1623251333085284.
Der volle Inhalt der QuelleSellami, Youssef. "Secure data management in an IoT-Fog/Edge computing architecture." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. https://ged.uphf.fr/nuxeo/site/esupversions/14bb8a1d-7fbb-4d10-a7e7-99650617c232.
Der volle Inhalt der QuelleKaim, Guillaume. "Cryptographie post-quantique pour la protection de la vie privée." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S077.
Der volle Inhalt der QuelleMajumdar, Aalo. "Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5573.
Der volle Inhalt der QuelleBücher zum Thema "Post-quantum security"
Djordjevic, Ivan B. Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-88372-9.
Der volle Inhalt der QuelleKumar, Adarsh, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, and Surbhi Bhatia Khan, eds. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0088-2.
Der volle Inhalt der QuellePerdigão, Rui A. P. From Quantum Information to Post-Quantum Security. Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/uc.241019.
Der volle Inhalt der QuelleDjordjevic, Ivan B., ed. Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-5004-6.
Der volle Inhalt der QuelleWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Den vollen Inhalt der Quelle findenWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Den vollen Inhalt der Quelle findenWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Den vollen Inhalt der Quelle findenWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Den vollen Inhalt der Quelle findenTomar, Deepak Singh, and Neelu Jyothi Ahuja. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Springer, 2024.
Den vollen Inhalt der Quelle findenBadhwar, Raj. CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms. Springer International Publishing AG, 2022.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Post-quantum security"
Bernstein, Daniel J. "Post-Quantum Cryptography." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_386.
Der volle Inhalt der QuelleBhatia, Amandeep Singh, and Ajay Kumar. "Post-Quantum Cryptography." In Emerging Security Algorithms and Techniques. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-9.
Der volle Inhalt der QuelleArya, Ashish, Arti Ranjan, and Amrit Kumar Agrawal. "Post-quantum image security." In Digital Image Security. CRC Press, 2024. http://dx.doi.org/10.1201/9781003468974-3.
Der volle Inhalt der QuelleCovic, Ana, Sreeja Chowdhury, Rabin Yu Acharya, Fatemeh Ganji, and Domenic Forte. "Post-Quantum Hardware Security." In Emerging Topics in Hardware Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_8.
Der volle Inhalt der QuelleBernstein, Daniel J. "Post-Quantum Cryptography." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-642-27739-9_386-2.
Der volle Inhalt der QuelleBernstein, Daniel J. "Post-quantum Cryptography." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_386.
Der volle Inhalt der QuelleCartor, Ryann, and Daniel Smith-Tone. "An Updated Security Analysis of PFLASH." In Post-Quantum Cryptography. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59879-6_14.
Der volle Inhalt der QuelleFehr, Serge, and Yu-Hsuan Huang. "On the Quantum Security of HAWK." In Post-Quantum Cryptography. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-40003-2_15.
Der volle Inhalt der QuelleYasuda, Takanori, and Kouichi Sakurai. "A Security Analysis of Uniformly-Layered Rainbow." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25405-5_18.
Der volle Inhalt der QuelleCzajkowski, Jan, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, and Dominique Unruh. "Post-quantum Security of the Sponge Construction." In Post-Quantum Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79063-3_9.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Post-quantum security"
Li, Pingzhi, Tianlong Chen, and Junyu Liu. "Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00067.
Der volle Inhalt der QuelleRani, Anju, Xiaoyu Ai, Aman Gupta, Ravi Singh Adhikari, and Robert Malaney. "Combined Quantum and Post-Quantum Security for Earth-Satellite Channels." In 2025 International Conference on Quantum Communications, Networking, and Computing (QCNC). IEEE, 2025. https://doi.org/10.1109/qcnc64685.2025.00055.
Der volle Inhalt der QuelleIshaq, Muhammad, and Bushra Al-Anesi. "Quantum Cryptography and Post-Quantum Security: Safeguarding Cryptographic Protocols Against Quantum Threats." In 2025 2nd International Conference on Advanced Innovations in Smart Cities (ICAISC). IEEE, 2025. https://doi.org/10.1109/icaisc64594.2025.10959635.
Der volle Inhalt der QuelleBenčina, Benjamin, Benjamin Dowling, Varun Maram, and Keita Xagawa. "Post-Quantum Cryptographic Analysis of SSH." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00126.
Der volle Inhalt der QuelleYang, Yibin, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, and Tal Rabin. "Gold OPRF: Post-Quantum Oblivious Power-Residue PRF." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00116.
Der volle Inhalt der QuelleSpitz, Stephan, Alexander Lawall, and Michal Andrzejczak. "Quantum-Resilient IoT: Integrating Hardware-Based Post-Quantum Cryptography for Robust Device Security." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013091100003899.
Der volle Inhalt der QuelleAhmad, Fahad, Katerina Kanta, Stavros Shiaeles, Afia Naeem, Zarnab Khalid, and Kainaat Mahboob. "Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key Distribution." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679471.
Der volle Inhalt der QuelleNguyen, Trong-Hung, Duc-Thuan Dam, Phuc-Phan Duong, Cong-Kha Pham, and Trong-Thuc Hoang. "A Compact SHA3 Implementation for Post-Quantum Cryptography." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813440.
Der volle Inhalt der QuelleAissaoui, Ridwane, Jean-Christophe Deneuville, Christophe Guerber, and Alain Pirovano. "Evaluating Post-Quantum Key Exchange Mechanisms for UAV Communication Security." In 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC). IEEE, 2024. http://dx.doi.org/10.1109/dasc62030.2024.10749304.
Der volle Inhalt der QuelleLatif, Mehar. "Breakthrough Solutions for Post-Quantum Security with QC-MDPC Codes." In 2024 IEEE 5th Women in Technology Conference (WINTECHCON). IEEE, 2024. https://doi.org/10.1109/wintechcon61988.2024.10838010.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Post-quantum security"
Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Der volle Inhalt der QuellePerdigão, Rui A. P. Neuro-Quantum Cyber-Physical Intelligence (NQCPI). Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/241024.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.
Der volle Inhalt der QuellePerdigão, Rui A. P. Strengthening Multi-Hazard Resilience with Quantum Aerospace Systems Intelligence. Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/240301.
Der volle Inhalt der QuellePasupuleti, Murali Krishna. Quantum Semiconductors for Scalable and Fault-Tolerant Computing. National Education Services, 2025. https://doi.org/10.62311/nesx/rr825.
Der volle Inhalt der QuelleFluhrer, S., P. Kampanakis, D. McGrew, and V. Smyslov. Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8784.
Der volle Inhalt der Quelle