Academic literature on the topic 'Post-Quantum Cryptography (PQC)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Post-Quantum Cryptography (PQC).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Post-Quantum Cryptography (PQC)"
Pasupuleti, Murali Krishna. "Post-Quantum Cryptography: Algorithms and Implementation Challenges." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 06 (2025): 234–43. https://doi.org/10.62311/nesx/rphcrcscrbc4.
Full textRenita, J. "From Inception to Realization: NIST's Post-Quantum Cryptography Standardization." Indian Journal of Cryptography and Network Security (IJCNS) 5, no. 1 (2025): 8–19. https://doi.org/10.54105/ijcns.A1437.05010525.
Full textGbadebo, Michael Olayinka. "Integrating Post-Quantum Cryptography and Advanced Encryption Standards to Safeguard Sensitive Financial Records from Emerging Cyber Threats." Asian Journal of Research in Computer Science 18, no. 4 (2025): 1–23. https://doi.org/10.9734/ajrcos/2025/v18i4605.
Full textRenita J, Edna Elizabeth N, and Suganya Annadurai. "From Inception to Realization: NIST's Post-Quantum Cryptography Standardization." Indian Journal of Cryptography and Network Security 5, no. 1 (2025): 8–19. https://doi.org/10.54105/ijcns.a1437.05010525.
Full textMahdi, Liyth H., and Alharith A. Abdullah. "Fortifying Future IoT Security: A Comprehensive Review on Lightweight Post-Quantum Cryptography." Engineering, Technology & Applied Science Research 15, no. 2 (2025): 21812–21. https://doi.org/10.48084/etasr.10141.
Full textZhang, Meng, Jing Wang, Junsen Lai, et al. "Research on Development Progress and Test Evaluation of Post-Quantum Cryptography." Entropy 27, no. 2 (2025): 212. https://doi.org/10.3390/e27020212.
Full textUçar, Eren Danyel. "Post-Quantum Cryptography: Designing Secure Cryptographic Systems to Withstand the Threat of Quantum Computing Attacks." Human Computer Interaction 8, no. 1 (2024): 65. http://dx.doi.org/10.62802/53c7az87.
Full textFernando, Prageeth. "Post-Quantum Cryptography: Current Developments, Challenges, and Future Directions." Path of Science 11, no. 6 (2025): 4001. https://doi.org/10.22178/pos.119-4.
Full textBerger, Denis, Mouad Lemoudden, and William J. Buchanan. "Post-Quantum Migration of the Tor Application." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 13. https://doi.org/10.3390/jcp5020013.
Full textBasheer, Dr Muhammed. "Applications of Ring Theory in Post-Quantum Cryptography." International Journal for Research in Applied Science and Engineering Technology 13, no. 6 (2025): 294–301. https://doi.org/10.22214/ijraset.2025.71981.
Full textBook chapters on the topic "Post-Quantum Cryptography (PQC)"
Yasuda, Masaya. "A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge." In International Symposium on Mathematics, Quantum Theory, and Cryptography. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5191-8_15.
Full textPandey, Shraiyash, Bharat Bhushan, and Alaa Ali Hameed. "Securing Healthcare 5.0: Zero-Knowledge Proof (ZKP) and Post Quantum Cryptography (PQC) Solutions for Medical Data Security." In Soft Computing in Industry 5.0 for Sustainability. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-69336-6_15.
Full textStrenzke, Falko, Erik Tews, H. Gregor Molter, Raphael Overbeck, and Abdulhadi Shoufan. "Side Channels in the McEliece PKC." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-88403-3_15.
Full textStrenzke, Falko. "A Timing Attack against the Secret Permutation in the McEliece PKC." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12929-2_8.
Full textEbrahimi, Ehsan. "Post-quantum Security of Plain OAEP Transform." In Public-Key Cryptography – PKC 2022. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97121-2_2.
Full textBrendel, Jacqueline, Rune Fiedler, Felix Günther, Christian Janson, and Douglas Stebila. "Post-quantum Asynchronous Deniable Key Exchange and the Signal Handshake." In Public-Key Cryptography – PKC 2022. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97131-1_1.
Full textChatterjee, Rohit, Kai-Min Chung, Xiao Liang, and Giulio Malavolta. "A Note on the Post-quantum Security of (Ring) Signatures." In Public-Key Cryptography – PKC 2022. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97131-1_14.
Full textIshibashi, Ren, and Kazuki Yoneyama. "Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles." In Public-Key Cryptography – PKC 2022. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97131-1_2.
Full textMarrok, Abderrahmane, Safaa Boukhelef, and Noureddine Chikouche. "PQH-WireGuard: Post-quantum Hybrid Cryptography-Based WireGuard VPN Protocol." In Lecture Notes in Networks and Systems. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-8324-7_25.
Full textHashimoto, Keitaro, Shuichi Katsumata, Kris Kwiatkowski, and Thomas Prest. "An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable." In Public-Key Cryptography – PKC 2021. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75248-4_15.
Full textConference papers on the topic "Post-Quantum Cryptography (PQC)"
Shim, Hyoungsub, Bongho Kang, Haejung Im, Duhyun Jeon, and Seok-min Kim. "Virtual Private Network (VPN) with Post-Quantum Cryptography (PQC)." In 2024 15th International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2024. https://doi.org/10.1109/ictc62082.2024.10827179.
Full textSowa, Jakub, Bach Hoang, Advaith Yeluru, et al. "Post-Quantum Cryptography (PQC) Network Instrument: Measuring PQC Adoption Rates and Identifying Migration Pathways." In 2024 IEEE International Conference on Quantum Computing and Engineering (QCE). IEEE, 2024. https://doi.org/10.1109/qce60285.2024.00213.
Full textRanganathan, Swetha, Shanmitha Karthikeyan, Chandrashekhar Pomu Chavan, and Shanthala P. T. "Integrating Quantum Key Distribution (QKD) with Post-Quantum Cryptography (PQC): Combining BB84 Protocol with Lattice-Based Cryptographic Techniques." In 2024 IEEE 4th International Conference on ICT in Business Industry & Government (ICTBIG). IEEE, 2024. https://doi.org/10.1109/ictbig64922.2024.10911719.
Full textAzarderakhsh, Reza, and Maryam Sadat Amiri Tehrani Zadeh. "Integrating post-quantum cryptography (PQC) with quantum key distribution (QKD): performance, security, and practical challenges." In Quantum Information Science, Sensing, and Computation XVII, edited by Michael L. Fanto and Michael Hayduk. SPIE, 2025. https://doi.org/10.1117/12.3055954.
Full textGiron, Alexandre Augusto, and Ricardo Custódio. "Hybrid Post-Quantum Cryptography in Network Protocols." In Anais Estendidos do Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2024. http://dx.doi.org/10.5753/sbseg_estendido.2024.241384.
Full textKumar, Manoj, and Pratap Pattnaik. "Post Quantum Cryptography(PQC) - An overview: (Invited Paper)." In 2020 IEEE High Performance Extreme Computing Conference (HPEC). IEEE, 2020. http://dx.doi.org/10.1109/hpec43674.2020.9286147.
Full textMarchiori, Dúnia, Alexandre A. Giron, João Pedro A. do Nascimento, and Ricardo Custódio. "Timing Analysis of Algorithm Substitution Attacks in a Post-Quantum TLS Protocol." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg.2021.17311.
Full textMarchiori, Dúnia, Alexandre A. Giron, João Pedro A. do Nascimento, and Ricardo Custódio. "Timing Analysis of Algorithm Substitution Attacks in a Post-Quantum TLS Protocol." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2021. http://dx.doi.org/10.5753/sbseg.2021.17311.
Full textGupta, Sweta, Kamlesh Kumar Gupta, Piyush Kumar Shukla, and Mahendra Kumar Shrivas. "Blockchain-based Voting System Powered by Post-Quantum Cryptography (BBVSP-PQC)." In 2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T). IEEE, 2022. http://dx.doi.org/10.1109/icpc2t53885.2022.9776966.
Full textNakka, Kalyan, Seerin Ahmad, Taesic Kim, Logan Atkinson, and Habib M. Ammari. "Post-Quantum Cryptography (PQC)-Grade IEEE 2030.5 for Quantum Secure Distributed Energy Resources Networks." In 2024 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, 2024. http://dx.doi.org/10.1109/isgt59692.2024.10454235.
Full textReports on the topic "Post-Quantum Cryptography (PQC)"
Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full text