Academic literature on the topic 'Post-quantum security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Post-quantum security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Post-quantum security"
V M, Thafzy, and Dr Nikesh P. "A Comparative Study of Hybrid Cryptographic Systems: Integrating Classical and Post-Quantum Cryptographic Techniques for Comprehensive Post-Quantum Security." International Journal of Research Publication and Reviews 6, no. 3 (2025): 962–70. https://doi.org/10.55248/gengpi.6.0325.1128.
Full textRanjita and Gautam Kumar Rajput Dr. "Cryptanalysis of pre-quantum and post-quantum cryptography." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 650–54. https://doi.org/10.5281/zenodo.13643131.
Full textLi, Silong, Yuxiang Chen, Lin Chen, et al. "Post-Quantum Security: Opportunities and Challenges." Sensors 23, no. 21 (2023): 8744. http://dx.doi.org/10.3390/s23218744.
Full textAbdulwahhab, Saba Alaa, Qasim Mohammed Hussien, and Imad Fakhri Al-Shaikhli. "An overview of number theory research unit variant development security." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1164–73. https://doi.org/10.11591/ijeecs.v28.i2.pp1164-1173.
Full textChen, Yiheng. "Quantum Security: An Overview of Quantum Cryptography." Theoretical and Natural Science 109, no. 1 (2025): 73–78. https://doi.org/10.54254/2753-8818/2025.gl23411.
Full textMüller, Johannes, and Jan Oupický. "Post-quantum XML and SAML Single Sign-On." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.
Full textSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Full textCultice, Tyler, and Himanshu Thapliyal. "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security." Information 13, no. 8 (2022): 382. http://dx.doi.org/10.3390/info13080382.
Full textJohanna, Barzen, and Leymann Frank. "Post-Quantum Security: Origin, Fundamentals, and Adoption." Trends in Computer Science and Information Technology 9, no. 3 (2024): 106–28. https://doi.org/10.17352/tcsit.000089.
Full textHosoyamada, Akinori. "On post-quantum security of symmetric cryptosystems." IEICE ESS Fundamentals Review 17, no. 1 (2023): 59–71. http://dx.doi.org/10.1587/essfr.17.1_59.
Full textDissertations / Theses on the topic "Post-quantum security"
Wilson, Freya Louise. "A solution for post quantum security using existing communications infrastructures." Thesis, University of Leeds, 2017. http://etheses.whiterose.ac.uk/20820/.
Full textMagnusson, Olof, and Mats Hurtig. "Post-Quantum Public Key Cryptography for the Internet of Things." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40459.
Full textDeneuville, Jean-Christophe. "Contributions à la cryptographie post-quantique." Thesis, Limoges, 2016. http://www.theses.fr/2016LIMO0112/document.
Full textBonnoron, Guillaume. "A journey towards practical fully homomorphic encryption." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0073/document.
Full textBindel, Nina [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Douglas [Akademischer Betreuer] Stebila. "On the Security of Lattice-Based Signature Schemes in a Post-Quantum World / Nina Bindel ; Johannes Buchmann, Douglas Stebila." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1169825729/34.
Full textSchrottenloher, André. "Quantum Algorithms for Cryptanalysis and Quantum-safe Symmetric Cryptography." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS271.
Full textZhang, Zheng. "The Singularity Attack on Himq-3: A High-Speed Signature Scheme Based on Multivariate Quadratic Equations." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1623251333085284.
Full textSellami, Youssef. "Secure data management in an IoT-Fog/Edge computing architecture." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. https://ged.uphf.fr/nuxeo/site/esupversions/14bb8a1d-7fbb-4d10-a7e7-99650617c232.
Full textKaim, Guillaume. "Cryptographie post-quantique pour la protection de la vie privée." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S077.
Full textMajumdar, Aalo. "Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved." Thesis, 2021. https://etd.iisc.ac.in/handle/2005/5573.
Full textBooks on the topic "Post-quantum security"
Djordjevic, Ivan B. Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-88372-9.
Full textKumar, Adarsh, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, and Surbhi Bhatia Khan, eds. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0088-2.
Full textPerdigão, Rui A. P. From Quantum Information to Post-Quantum Security. Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/uc.241019.
Full textDjordjevic, Ivan B., ed. Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-5004-6.
Full textWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Find full textWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Find full textWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Find full textWireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.
Find full textTomar, Deepak Singh, and Neelu Jyothi Ahuja. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Springer, 2024.
Find full textBadhwar, Raj. CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms. Springer International Publishing AG, 2022.
Find full textBook chapters on the topic "Post-quantum security"
Bernstein, Daniel J. "Post-Quantum Cryptography." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_386.
Full textBhatia, Amandeep Singh, and Ajay Kumar. "Post-Quantum Cryptography." In Emerging Security Algorithms and Techniques. Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9781351021708-9.
Full textArya, Ashish, Arti Ranjan, and Amrit Kumar Agrawal. "Post-quantum image security." In Digital Image Security. CRC Press, 2024. http://dx.doi.org/10.1201/9781003468974-3.
Full textCovic, Ana, Sreeja Chowdhury, Rabin Yu Acharya, Fatemeh Ganji, and Domenic Forte. "Post-Quantum Hardware Security." In Emerging Topics in Hardware Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_8.
Full textBernstein, Daniel J. "Post-Quantum Cryptography." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2024. http://dx.doi.org/10.1007/978-3-642-27739-9_386-2.
Full textBernstein, Daniel J. "Post-quantum Cryptography." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_386.
Full textCartor, Ryann, and Daniel Smith-Tone. "An Updated Security Analysis of PFLASH." In Post-Quantum Cryptography. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59879-6_14.
Full textFehr, Serge, and Yu-Hsuan Huang. "On the Quantum Security of HAWK." In Post-Quantum Cryptography. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-40003-2_15.
Full textYasuda, Takanori, and Kouichi Sakurai. "A Security Analysis of Uniformly-Layered Rainbow." In Post-Quantum Cryptography. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25405-5_18.
Full textCzajkowski, Jan, Leon Groot Bruinderink, Andreas Hülsing, Christian Schaffner, and Dominique Unruh. "Post-quantum Security of the Sponge Construction." In Post-Quantum Cryptography. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-79063-3_9.
Full textConference papers on the topic "Post-quantum security"
Li, Pingzhi, Tianlong Chen, and Junyu Liu. "Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography." In 2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA). IEEE, 2024. https://doi.org/10.1109/tps-isa62245.2024.00067.
Full textRani, Anju, Xiaoyu Ai, Aman Gupta, Ravi Singh Adhikari, and Robert Malaney. "Combined Quantum and Post-Quantum Security for Earth-Satellite Channels." In 2025 International Conference on Quantum Communications, Networking, and Computing (QCNC). IEEE, 2025. https://doi.org/10.1109/qcnc64685.2025.00055.
Full textIshaq, Muhammad, and Bushra Al-Anesi. "Quantum Cryptography and Post-Quantum Security: Safeguarding Cryptographic Protocols Against Quantum Threats." In 2025 2nd International Conference on Advanced Innovations in Smart Cities (ICAISC). IEEE, 2025. https://doi.org/10.1109/icaisc64594.2025.10959635.
Full textBenčina, Benjamin, Benjamin Dowling, Varun Maram, and Keita Xagawa. "Post-Quantum Cryptographic Analysis of SSH." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00126.
Full textYang, Yibin, Fabrice Benhamouda, Shai Halevi, Hugo Krawczyk, and Tal Rabin. "Gold OPRF: Post-Quantum Oblivious Power-Residue PRF." In 2025 IEEE Symposium on Security and Privacy (SP). IEEE, 2025. https://doi.org/10.1109/sp61157.2025.00116.
Full textSpitz, Stephan, Alexander Lawall, and Michal Andrzejczak. "Quantum-Resilient IoT: Integrating Hardware-Based Post-Quantum Cryptography for Robust Device Security." In 11th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013091100003899.
Full textAhmad, Fahad, Katerina Kanta, Stavros Shiaeles, Afia Naeem, Zarnab Khalid, and Kainaat Mahboob. "Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key Distribution." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679471.
Full textNguyen, Trong-Hung, Duc-Thuan Dam, Phuc-Phan Duong, Cong-Kha Pham, and Trong-Thuc Hoang. "A Compact SHA3 Implementation for Post-Quantum Cryptography." In 2024 1st International Conference On Cryptography And Information Security (VCRIS). IEEE, 2024. https://doi.org/10.1109/vcris63677.2024.10813440.
Full textAissaoui, Ridwane, Jean-Christophe Deneuville, Christophe Guerber, and Alain Pirovano. "Evaluating Post-Quantum Key Exchange Mechanisms for UAV Communication Security." In 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC). IEEE, 2024. http://dx.doi.org/10.1109/dasc62030.2024.10749304.
Full textLatif, Mehar. "Breakthrough Solutions for Post-Quantum Security with QC-MDPC Codes." In 2024 IEEE 5th Women in Technology Conference (WINTECHCON). IEEE, 2024. https://doi.org/10.1109/wintechcon61988.2024.10838010.
Full textReports on the topic "Post-quantum security"
Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full textPerdigão, Rui A. P. Neuro-Quantum Cyber-Physical Intelligence (NQCPI). Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/241024.
Full textPasupuleti, Murali Krishna. Securing AI-driven Infrastructure: Advanced Cybersecurity Frameworks for Cloud and Edge Computing Environments. National Education Services, 2025. https://doi.org/10.62311/nesx/rrv225.
Full textPasupuleti, Murali Krishna. Scalable Quantum Networks: Entanglement-Driven Secure Communication. National Education Services, 2025. https://doi.org/10.62311/nesx/rrvi525.
Full textPerdigão, Rui A. P. Strengthening Multi-Hazard Resilience with Quantum Aerospace Systems Intelligence. Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/240301.
Full textPasupuleti, Murali Krishna. Quantum Semiconductors for Scalable and Fault-Tolerant Computing. National Education Services, 2025. https://doi.org/10.62311/nesx/rr825.
Full textFluhrer, S., P. Kampanakis, D. McGrew, and V. Smyslov. Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security. RFC Editor, 2020. http://dx.doi.org/10.17487/rfc8784.
Full text