To see the other types of publications on this topic, follow the link: Post-quantum security.

Books on the topic 'Post-quantum security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 16 books for your research on the topic 'Post-quantum security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Djordjevic, Ivan B. Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-88372-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Adarsh, Neelu Jyothi Ahuja, Keshav Kaushik, Deepak Singh Tomar, and Surbhi Bhatia Khan, eds. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0088-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Perdigão, Rui A. P. From Quantum Information to Post-Quantum Security. Synergistic Manifolds, 2024. http://dx.doi.org/10.46337/uc.241019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Djordjevic, Ivan B., ed. Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography. MDPI, 2022. http://dx.doi.org/10.3390/books978-3-0365-5004-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wireless Quantum Networks, Volume 2 : Quantum vs Post Quantum Security: Algorithms and Design Technology. Wiley & Sons, Incorporated, John, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tomar, Deepak Singh, and Neelu Jyothi Ahuja. Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications. Springer, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Badhwar, Raj. CISO's Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms. Springer International Publishing AG, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ding, Jintai, and Jean-Pierre Tillich. Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020, Paris, France, April 15–17, 2020, Proceedings. Springer, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Badhwar, Raj. The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms. Springer International Publishing AG, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ding, Jintai, and Rainer Steinwandt. Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings (Lecture Notes in Computer Science). Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Mendhe, Dinesh. Post-Quantum Cryptography: Securing Systems in the Quantum Computing Era. Mendhe, Dinesh, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bolfing, Andreas. Cryptographic Primitives in Blockchain Technology. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198862840.001.0001.

Full text
Abstract:
Many online applications, especially in the financial industries, are running on blockchain technologies in a decentralized manner, without the use of an authoritative entity or a trusted third party. Such systems are only secured by cryptographic protocols and a consensus mechanism. As blockchain-based solutions will continue to revolutionize online applications in a growing digital market in the future, one needs to identify the principal opportunities and potential risks. Hence, it is unavoidable to learn the mathematical and cryptographic procedures behind blockchain technology in order to
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!