Journal articles on the topic 'Quantum-Resistant Algorithms'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Quantum-Resistant Algorithms.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
S, Vijay, Priya S, C. N. Harshavardhana, and Kemparaju R. "QUANTUM-RESISTANT CRYPTOGRAPHIC ALGORITHMS FOR SECURE COMMUNICATION." ICTACT Journal on Communication Technology 15, no. 3 (2024): 3276–81. http://dx.doi.org/10.21917/ijct.2024.0487.
Full textAyub, Afrah, Sharlene Anna Pereira, Mohammed Amaan Thayyil, and Mahi Ayub. "From Bytes to Qubits: The Cybersecurity Implications of Quantum Advancements." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 008 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37398.
Full textLuo, Jiaoyan, Liming Zuo, and Hao Liu. "Quantum-Resistant Lattice-Based Proxy Signature." Symmetry 17, no. 2 (2025): 261. https://doi.org/10.3390/sym17020261.
Full textZentai, Daniel. "On the Efficiency of the Lamport Signature Scheme." Land Forces Academy Review 25, no. 3 (2020): 275–80. http://dx.doi.org/10.2478/raft-2020-0033.
Full textEasttom, William. "Quantum Resistant Cryptography and Cyberwarfare." International Conference on Cyber Warfare and Security 20, no. 1 (2025): 71–78. https://doi.org/10.34190/iccws.20.1.3257.
Full textKurysheva, A. A. "OVERVIEW OF CANDIDATES FOR QUANTUM-RESISTANT CIPHERS." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 226 (April 2023): 49–60. http://dx.doi.org/10.14489/vkit.2023.04.pp.049-060.
Full textWai Kaey, Tan. "Navigating the Quantum Era: Exploring Lightweight Quantum-Resistant Cryptography." IC-ITECHS 5, no. 1 (2024): 586–96. https://doi.org/10.32664/ic-itechs.v5i1.1489.
Full textGorine, Adam, and Muhammad Suhaib. "Exploring AES Encryption Implementation Through Quantum Computing Techniques." American Journal of Computer Science and Technology 7, no. 4 (2024): 139–55. http://dx.doi.org/10.11648/j.ajcst.20240704.12.
Full textResearcher. "THE IMPACT OF QUANTUM COMPUTING ON CRYPTOGRAPHIC SECURITY: CHALLENGES AND MITIGATION STRATEGIES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 764–72. https://doi.org/10.5281/zenodo.13383192.
Full textRakibul Hasan Chowdhury. "Quantum-resistant cryptography: A new frontier in fintech security." World Journal of Advanced Engineering Technology and Sciences 12, no. 2 (2024): 614–21. http://dx.doi.org/10.30574/wjaets.2024.12.2.0333.
Full textShrestha, Roman B. "A Review on the Impact of Quantum Computing on Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 9, no. 10 (2021): 972–75. http://dx.doi.org/10.22214/ijraset.2021.38510.
Full textLưu Hồng Dũng, Nguyen Kim Tuan, Nong Phuong Trang, and Pham Van Quoc. "A solution for constructing quantum – resistant digital signature schemes." Journal of Military Science and Technology, CSCE8 (December 30, 2024): 108–18. https://doi.org/10.54939/1859-1043.j.mst.csce8.2024.108-118.
Full textRojasree, V., and J. Gnana Jayanthi. "Intelligent Key Cryptography (IKC) using Tamil Unicode and Temporal Time: A Research Perspective Analysis." Indian Journal Of Science And Technology 18, no. 24 (2025): 1953–60. https://doi.org/10.17485/ijst/v18i24.339.
Full textGhosh, Sagarika, Marzia Zaman, Gary Sakauye, and Srinivas Sampalli. "An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme." Applied Sciences 11, no. 5 (2021): 2082. http://dx.doi.org/10.3390/app11052082.
Full textTobi Olatunde Sonubi, Temidayo Osinaike, Adeola Raji, and Ayinoluwa Feranmi Kolawole. "Next-generation financial encryption using image analyzer algorithms: A design and implementation approach." World Journal of Advanced Engineering Technology and Sciences 13, no. 1 (2024): 718–27. http://dx.doi.org/10.30574/wjaets.2024.13.1.0479.
Full textGitonga, Charles Kinyua. "The Impact of Quantum Computing on Cryptographic Systems: Urgency of Quantum-Resistant Algorithms and Practical Applications in Cryptography." European Journal of Information Technologies and Computer Science 5, no. 1 (2025): 1–10. https://doi.org/10.24018/compute.2025.5.1.146.
Full textShen, Tingle, Li Miao, Bin Hua, and Shuai Li. "An NTRU-like Message Recoverable Signature Algorithm." Mathematics 12, no. 13 (2024): 2051. http://dx.doi.org/10.3390/math12132051.
Full textTambe-Jagtap, Swapnali N. "A Survey of Cryptographic Algorithms in Cybersecurity: From Classical Methods to Quantum-Resistant Solutions." SHIFRA 2023 (June 1, 2023): 1–10. http://dx.doi.org/10.70470/shifra/2023/006.
Full textYogeswara, Reddy Avuthu. "Quantum-Resistant Security Mechanisms in Cloud-Native Microservices Pipelines." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 5, no. 5 (2019): 1–13. https://doi.org/10.5281/zenodo.14183867.
Full textЛАВРИК, ІВАН. "ДОСЛІДЖЕННЯ АЛГОРИТМІВ ПОСТКВАНТОВОГО ЦИФРОВОГО ПІДПИСУ". Herald of Khmelnytskyi National University. Technical sciences 333, № 2 (2024): 361–69. http://dx.doi.org/10.31891/2307-5732-2024-333-2-56.
Full textRaffaelli, Francesco, Robert Denman, Richard Collins, et al. "Combining a quantum random number generator and quantum-resistant algorithms into the GnuGPG open-source software." Advanced Optical Technologies 9, no. 5 (2020): 287–95. http://dx.doi.org/10.1515/aot-2020-0021.
Full textThi Bac, DO, and Bounsaveng Khit. "An overview of quantum resistance digital signatures based on hash functions." Vinh University Journal of Science 52, no. 3A (2023): 40–54. http://dx.doi.org/10.56824/vujs.2023a046.
Full textAmirkhanova, Dana Sairangazhykyzy, Maksim Iavich, and Orken Mamyrbayev. "Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles." Cryptography 8, no. 3 (2024): 31. http://dx.doi.org/10.3390/cryptography8030031.
Full textSwapnil Chawande. "Quantum computing threats to cybersecurity protocols." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 707–20. https://doi.org/10.30574/wjaets.2025.15.2.0546.
Full textCisneros Laule, Mauricio Sebastian, Javier Enrique Olazabal Silva, and Hernan Nina Hanco. "Lattice-Based Cryptography: Development and Analysis of a New Variant of the Crystals-Kyber Algorithm." Interfases, no. 020 (December 26, 2024): 163–82. https://doi.org/10.26439/interfases2024.n020.7383.
Full textMohammed, Anwar. "Quantum-Resistant Cryptography: Developing Encryption Against Quantum Attacks." Quantum-Resistant Cryptography: Developing Encryption Against Quantum Attacks 1, no. 1 (2018): 1–11. https://doi.org/10.5281/zenodo.14760501.
Full textSagar Ramesh Rane. "Quantum-Resistant Cryptographic Algorithms: A Comparative Analysis for Securing Next-Generation Communication Networks." Journal of Information Systems Engineering and Management 10, no. 13s (2025): 725–31. https://doi.org/10.52783/jisem.v10i13s.2155.
Full textGorbenko, I. D., and Ye Yu Kaptol. "Analysis and comparison of the security of electronic signatures based on new quantum-resistant problems." Radiotekhnika, no. 215 (December 25, 2023): 31–45. http://dx.doi.org/10.30837/rt.2023.4.215.04.
Full textSharma, Ankita. "PROTOCOLS FOR QUANTUM-RESISTANT NETWORKS." International Research Journal of Computer Science 08, no. 07 (2021): 165–71. http://dx.doi.org/10.26562/irjcs.2021.v0807.006.
Full textAl Attar, Tara Nawzad Ahmad, Mohammed Anwar Mohammed, and Rebaz Nawzad Mohammed. "Exploring Post-Quantum Cryptography: Evaluating Algorithm Resilience against Global Quantum Threats." UHD Journal of Science and Technology 9, no. 1 (2025): 18–28. https://doi.org/10.21928/uhdjst.v9n1y2025.pp18-28.
Full textCherkaoui Dekkaki, Kanza, Igor Tasic, and Maria-Dolores Cano. "Exploring Post-Quantum Cryptography: Review and Directions for the Transition Process." Technologies 12, no. 12 (2024): 241. http://dx.doi.org/10.3390/technologies12120241.
Full textFarooq, Sana, Ayesha Altaf, Faiza Iqbal, et al. "Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms." Sensors 23, no. 12 (2023): 5379. http://dx.doi.org/10.3390/s23125379.
Full textHitesh T Loriya. "Quantum Resistant Cryptosystem-Based Security Protocol for 5G Network." Communications on Applied Nonlinear Analysis 31, no. 7s (2024): 696–705. http://dx.doi.org/10.52783/cana.v31.1589.
Full textOyekunle Claudius Oyeniran, Adebunmi Okechukwu Adewusi, Adams Gbolahan Adeleke, Chidimma Francisca Azubuko, and Lucy Anthony Akwawa. "Advancements in quantum computing and their implications for software development." Computer Science & IT Research Journal 4, no. 3 (2023): 577–93. http://dx.doi.org/10.51594/csitrj.v4i3.1558.
Full textCharan, Shankar Kummarapurugu. "Adaptive Security Controls Using Lattice-Based Quantum-Resistant Algorithms in Hybrid Cloud." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 6 (2020): 1–7. https://doi.org/10.5281/zenodo.14183874.
Full textKhalid, Zhwan Mohammed, and Shavan Askar. "Resistant Blockchain Cryptography to Quantum Computing Attacks." International Journal of Science and Business 5, no. 3 (2021): 116–25. https://doi.org/10.5281/zenodo.4497732.
Full textNeish, Andrew, Todd Walter, and Per Enge. "Quantum‐resistant authentication algorithms for satellite‐based augmentation systems." Navigation 66, no. 1 (2019): 199–209. http://dx.doi.org/10.1002/navi.287.
Full textRaavi, Manohar, Qaiser Khan, Simeon Wuthier, Pranav Chandramouli, Yaroslav Balytskyi, and Sang-Yoon Chang. "Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations." Cryptography 9, no. 2 (2025): 38. https://doi.org/10.3390/cryptography9020038.
Full textVidaković, Marin, and Kruno Miličević. "Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments." Algorithms 16, no. 11 (2023): 518. http://dx.doi.org/10.3390/a16110518.
Full textVishnuvardhana Reddy Veeraballi. "Quantum Computing Encryption: Emerging Trends in Cybersecurity." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 2678–86. https://doi.org/10.32628/cseit251112288.
Full textHosseini, Seyed M., and Hossein Pilaram. "A comprehensive review of post-quantum cryptography: Challenges and advances." International Journal of Data and Network Science 9, no. 2 (2025): 267–88. https://doi.org/10.5267/j.ijdns.2024.12.003.
Full textOstrianska, Ye V., M. V. Yesina, and I. D. Gorbenko. "Analysis of views of the European Union on quantum-post-quantum limitations." Radiotekhnika, no. 210 (September 28, 2022): 87–98. http://dx.doi.org/10.30837/rt.2022.3.210.06.
Full textOjha, Dharma Raj. "Quantum Computing: Potential Impacts on Cryptography and Data Security." Journal of Durgalaxmi 3 (December 31, 2024): 87–106. https://doi.org/10.3126/jdl.v3i1.73848.
Full textRaheman, Fazal. "The Future of Cybersecurity in the Age of Quantum Computers." Future Internet 14, no. 11 (2022): 335. http://dx.doi.org/10.3390/fi14110335.
Full textShuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.
Full textRichter, Maximilian, Magdalena Bertram, Jasper Seidensticker, and Alexander Tschache. "A Mathematical Perspective on Post-Quantum Cryptography." Mathematics 10, no. 15 (2022): 2579. http://dx.doi.org/10.3390/math10152579.
Full textRakhmadi Rahman, Awal Ramadhan Nasrun, and Adinda Aulia Rahmi. "Desain dan Implementasi Sistem Operasi Linux Ubuntu Versi 22.04 untuk Perlindungan Data dari Serangan Komputasi Kuantum." Bridge : Jurnal publikasi Sistem Informasi dan Telekomunikasi 2, no. 3 (2024): 207–13. http://dx.doi.org/10.62951/bridge.v2i3.159.
Full textGoncalves, Brian, and Atefeh Mashatan. "Tightly Secure PKE Combiner in the Quantum Random Oracle Model." Cryptography 6, no. 2 (2022): 15. http://dx.doi.org/10.3390/cryptography6020015.
Full textJoshi, Abhijit. "Ethical AI and Data Integrity: Ensuring Responsible AI Innovation Through Quantum - Resistant Algorithms and Federated Learning Paradigms." International Journal of Science and Research (IJSR) 12, no. 1 (2023): 1297–304. http://dx.doi.org/10.21275/sr24615150919.
Full textCherckesova, Larissa V., Olga A. Safaryan, Nikita G. Lyashenko, and Denis A. Korochentsev. "Developing a New Collision-Resistant Hashing Algorithm." Mathematics 10, no. 15 (2022): 2769. http://dx.doi.org/10.3390/math10152769.
Full text