Zeitschriftenartikel zum Thema „Post-quantum security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Post-quantum security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
V M, Thafzy, and Dr Nikesh P. "A Comparative Study of Hybrid Cryptographic Systems: Integrating Classical and Post-Quantum Cryptographic Techniques for Comprehensive Post-Quantum Security." International Journal of Research Publication and Reviews 6, no. 3 (2025): 962–70. https://doi.org/10.55248/gengpi.6.0325.1128.
Der volle Inhalt der QuelleRanjita and Gautam Kumar Rajput Dr. "Cryptanalysis of pre-quantum and post-quantum cryptography." International Journal of Advance Research in Multidisciplinary 1, no. 1 (2023): 650–54. https://doi.org/10.5281/zenodo.13643131.
Der volle Inhalt der QuelleLi, Silong, Yuxiang Chen, Lin Chen, et al. "Post-Quantum Security: Opportunities and Challenges." Sensors 23, no. 21 (2023): 8744. http://dx.doi.org/10.3390/s23218744.
Der volle Inhalt der QuelleAbdulwahhab, Saba Alaa, Qasim Mohammed Hussien, and Imad Fakhri Al-Shaikhli. "An overview of number theory research unit variant development security." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 2 (2022): 1164–73. https://doi.org/10.11591/ijeecs.v28.i2.pp1164-1173.
Der volle Inhalt der QuelleChen, Yiheng. "Quantum Security: An Overview of Quantum Cryptography." Theoretical and Natural Science 109, no. 1 (2025): 73–78. https://doi.org/10.54254/2753-8818/2025.gl23411.
Der volle Inhalt der QuelleMüller, Johannes, and Jan Oupický. "Post-quantum XML and SAML Single Sign-On." Proceedings on Privacy Enhancing Technologies 2024, no. 4 (2024): 525–43. http://dx.doi.org/10.56553/popets-2024-0128.
Der volle Inhalt der QuelleSedat Sonko, Kenneth Ifeanyi Ibekwe, Valentine Ikenna Ilojianya, Emmanuel Augustine Etukudoh, and Adefunke Fabuyide. "QUANTUM CRYPTOGRAPHY AND U.S. DIGITAL SECURITY: A COMPREHENSIVE REVIEW: INVESTIGATING THE POTENTIAL OF QUANTUM TECHNOLOGIES IN CREATING UNBREAKABLE ENCRYPTION AND THEIR FUTURE IN NATIONAL SECURITY." Computer Science & IT Research Journal 5, no. 2 (2024): 390–414. http://dx.doi.org/10.51594/csitrj.v5i2.790.
Der volle Inhalt der QuelleCultice, Tyler, and Himanshu Thapliyal. "PUF-Based Post-Quantum CAN-FD Framework for Vehicular Security." Information 13, no. 8 (2022): 382. http://dx.doi.org/10.3390/info13080382.
Der volle Inhalt der QuelleJohanna, Barzen, and Leymann Frank. "Post-Quantum Security: Origin, Fundamentals, and Adoption." Trends in Computer Science and Information Technology 9, no. 3 (2024): 106–28. https://doi.org/10.17352/tcsit.000089.
Der volle Inhalt der QuelleHosoyamada, Akinori. "On post-quantum security of symmetric cryptosystems." IEICE ESS Fundamentals Review 17, no. 1 (2023): 59–71. http://dx.doi.org/10.1587/essfr.17.1_59.
Der volle Inhalt der QuelleIavich, Maksim, and Dana Amirkhanova Sairangazhykyzy. "Post-quantum Digital Signatures using ElGamal Approach." International Journal of Computer Network and Information Security 17, no. 3 (2025): 89–108. https://doi.org/10.5815/ijcnis.2025.03.06.
Der volle Inhalt der QuelleSharadadevi Kaganurmath. "Post-Quantum Lightweight Key Sharing Protocol for Secure MQTT-Based IoT Networks." Journal of Information Systems Engineering and Management 10, no. 42s (2025): 532–45. https://doi.org/10.52783/jisem.v10i42s.7914.
Der volle Inhalt der QuelleSong, Gyeongju, Kyoungbae Jang, Hyunjun Kim, et al. "SPEEDY Quantum Circuit for Grover’s Algorithm." Applied Sciences 12, no. 14 (2022): 6870. http://dx.doi.org/10.3390/app12146870.
Der volle Inhalt der QuelleDjordjevic, Ivan B. "Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography." Entropy 24, no. 7 (2022): 935. http://dx.doi.org/10.3390/e24070935.
Der volle Inhalt der QuelleBene, Fruzsina, and Attila Kiss. "Post-Quantum Security Overview of the Public Key Infrastructure." SYSTEM THEORY, CONTROL AND COMPUTING JOURNAL 3, no. 2 (2023): 27–35. http://dx.doi.org/10.52846/stccj.2023.3.2.55.
Der volle Inhalt der QuelleShuxrat, Toirov Abduganiyevich, Eldor Islomovich Saidakhmedov, and X.U Akbarov. "Enhancing post-quantum security through hybrid cryptographic systems integrating quantum key distribution." Yashil iqtisodiyot va taraqqiyot 3, no. 2 (2025): 6–10. https://doi.org/10.5281/zenodo.14868992.
Der volle Inhalt der QuelleKumar Bathala, Naresh, Naga Pawan YVR, Dhrubajyoti Choudhury, Ambika M, Kannadhasan S, and Padmavathy R. "Quantum Computing Paradigms Implications for Cryptography and Data Security in Information Systems." ITM Web of Conferences 76 (2025): 05005. https://doi.org/10.1051/itmconf/20257605005.
Der volle Inhalt der QuelleWayne, Henderson, Magal Mykhailo, and P. Autry Christopher. "Fully Decentralised, Post-Quantum Secure Networks." International Journal of Mathematics And Computer Research 10, no. 04 (2022): 2644–45. https://doi.org/10.5281/zenodo.6409629.
Der volle Inhalt der QuelleB, Sonia Singh, Sravan Karthik T, and Shubhaprada KP. "Investigating SHA and Proposing SPHINCS+ as a Post Quantum Algorithm (PQC)." International Journal for Research in Applied Science and Engineering Technology 11, no. 9 (2023): 1611–15. http://dx.doi.org/10.22214/ijraset.2023.55872.
Der volle Inhalt der QuelleRenita, J. "From Inception to Realization: NIST's Post-Quantum Cryptography Standardization." Indian Journal of Cryptography and Network Security (IJCNS) 5, no. 1 (2025): 8–19. https://doi.org/10.54105/ijcns.A1437.05010525.
Der volle Inhalt der QuelleTuhin Banerjee. "Post-quantum cryptography: Reshaping the future of identity and access management." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 350–56. https://doi.org/10.30574/wjaets.2025.15.2.0567.
Der volle Inhalt der QuelleAravinda, S., Anindita Banerjee, Anirban Pathak, and R. Srikanth. "Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories." International Journal of Quantum Information 12, no. 07n08 (2014): 1560020. http://dx.doi.org/10.1142/s0219749915600205.
Der volle Inhalt der QuelleSharma, Ankita. "PROTOCOLS FOR QUANTUM-RESISTANT NETWORKS." International Research Journal of Computer Science 08, no. 07 (2021): 165–71. http://dx.doi.org/10.26562/irjcs.2021.v0807.006.
Der volle Inhalt der QuelleEnoch, Oluwademilade Sodiya, Joseph Umoga Uchenna, Oladipupo Amoo Olukunle, and Atadoga Akoh. "Quantum computing and its potential impact on U.S. cybersecurity: A review: Scrutinizing the challenges and opportunities presented by quantum technologies in safeguarding digital assets." Global Journal of Engineering and Technology Advances 18, no. 2 (2024): 049–64. https://doi.org/10.5281/zenodo.10947345.
Der volle Inhalt der QuelleLatika Rahul Desai. "Advanced Techniques in Post-Quantum Cryptography for Ensuring Data Security in the Quantum Era." Panamerican Mathematical Journal 35, no. 1s (2024): 58–71. http://dx.doi.org/10.52783/pmj.v35.i1s.2097.
Der volle Inhalt der QuelleSantoso, Bagus, and Chunhua Su. "A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 294–308. https://doi.org/10.3217/jucs-025-03-0294.
Der volle Inhalt der QuelleDerek Asir Muthurajan Caleb. "Quantum-secure data centers: Preparing critical infrastructure for the post-quantum era." World Journal of Advanced Research and Reviews 26, no. 2 (2025): 2950–59. https://doi.org/10.30574/wjarr.2025.26.2.1742.
Der volle Inhalt der QuelleRama Krishna, Mallu Shiva, Patwari KrishnaRao, and Manumula Srinubabu. "Evaluating the Impact of Quantum Algorithms on Modern Cybersecurity Mechanisms." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft016.
Der volle Inhalt der QuelleSubbarao, Kondapalli V. V., and Manas Kumar Yogi. "An Investigative Study on Variants of Post-Quantum RSA." Journal of Cryptography and Network Security, Design and Codes 1, no. 1 (2024): 19–31. http://dx.doi.org/10.46610/jocnsdc.2024.v01i01.003.
Der volle Inhalt der QuelleKandii, S. O., and I. D. Gorbenko. "Analysis of DSTU 8961:2019 in the quantum random oracle model." Radiotekhnika, no. 214 (September 29, 2023): 7–16. http://dx.doi.org/10.30837/rt.2023.3.214.01.
Der volle Inhalt der QuelleGhosh, Sagarika, Marzia Zaman, Gary Sakauye, and Srinivas Sampalli. "An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme." Applied Sciences 11, no. 5 (2021): 2082. http://dx.doi.org/10.3390/app11052082.
Der volle Inhalt der QuelleHenge, Santosh Kumar, Gitanjali Jayaraman, M. Sreedevi, et al. "Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology." Networks and Heterogeneous Media 18, no. 3 (2023): 1313–34. http://dx.doi.org/10.3934/nhm.2023057.
Der volle Inhalt der QuelleYevseiev, Serhii, Alla Gavrilova, Bogdan Tomashevsky, and Firuz Samadov. "Research of crypto-code designs construction for using in post quantum cryptography." Development Management 16, no. 4 (2019): 26–39. http://dx.doi.org/10.21511/dm.4(4).2018.03.
Der volle Inhalt der QuelleGabriel, O., S. O. Olabiyisi, W. O. Ismaila,, O. A. Falade, and O. Alawode. "Integrating Quantum Computing Into Blockchain: Strategies for Overcoming Scalability and Security Challenges." Advances in Multidisciplinary & Scientific Research Journal Publication 15, no. 3 (2024): 15–28. http://dx.doi.org/10.22624/aims/cisdi/v15n3p2.
Der volle Inhalt der QuelleAbura, Samson. "Quantum computing and wireless networks security: A survey." GSC Advanced Research and Reviews 20, no. 2 (2024): 199–230. https://doi.org/10.5281/zenodo.14969953.
Der volle Inhalt der QuelleV A, Neethu. "Strengthening Cloud Security Against Cyber Attacks: Integrating Blockchain and Quantum Cryptography for Enhanced Integrity and Protection." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45949.
Der volle Inhalt der QuelleFakhruldeen, Hassan Falah, Rana Abbas Al-Kaabi, Feryal Ibrahim Jabbar, Ibrahim H. Al-Kharsan, and Sarah Jawad Shoja. "Post-quantum Techniques in Wireless Network Security: An Overview." Malaysian Journal of Fundamental and Applied Sciences 19, no. 3 (2023): 337–44. http://dx.doi.org/10.11113/mjfas.v19n3.2905.
Der volle Inhalt der QuelleKim, Hyunjun, Wonwoong Kim, Yeajun Kang, Hyunji Kim, and Hwajeong Seo. "Post-Quantum Delegated Proof of Luck for Blockchain Consensus Algorithm." Applied Sciences 14, no. 18 (2024): 8394. http://dx.doi.org/10.3390/app14188394.
Der volle Inhalt der QuelleCultice, Tyler, Joseph Clark, Wu Yang, and Himanshu Thapliyal. "A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World." Sensors 23, no. 24 (2023): 9886. http://dx.doi.org/10.3390/s23249886.
Der volle Inhalt der QuelleEhsan, M. Awais, Walaa Alayed, Amad Ur Rehman, Waqar ul Hassan, and Ahmed Zeeshan. "Post-Quantum KEMs for IoT: A Study of Kyber and NTRU." Symmetry 17, no. 6 (2025): 881. https://doi.org/10.3390/sym17060881.
Der volle Inhalt der QuelleKrishnaprabha. R. "Leveraging LDPC-Optimized Niederreiter Cryptosystems for Quantum-Resilient IoT Security Applications." Communications on Applied Nonlinear Analysis 32, no. 6s (2025): 215–40. https://doi.org/10.52783/cana.v32.3288.
Der volle Inhalt der QuelleDan BORUGA, Daniel BOLINTINEANU, and George Iulian RACATES. "Quantum-enhanced algorithms for real-time processing in cryptographic systems: A path towards post-quantum security." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 193–204. http://dx.doi.org/10.30574/wjaets.2024.13.2.0561.
Der volle Inhalt der QuelleBanks, Michael. "US outlines shift to ‘post-quantum cryptography’." Physics World 35, no. 6 (2022): 12iii. http://dx.doi.org/10.1088/2058-7058/35/06/18.
Der volle Inhalt der QuelleGabriel, O., S. O. Olabiyisi,, W. O. Ismaila, O. A. Falade, and O. Alawode. "Integrating Quantum Computing Into Blockchain: Strategies for Overcoming Scalability and Security Challenges." Advances in Multidisciplinary & Scientific Research Journal Publication 15, no. 3 (2024): 15–28. http://dx.doi.org/10.22624/aims/cisdi/v15n3p2x.
Der volle Inhalt der QuelleYang, Yujin, Kyungbae Jang, Anubhab Baksi, and Hwajeong Seo. "Optimized Implementation and Analysis of CHAM in Quantum Computing." Applied Sciences 13, no. 8 (2023): 5156. http://dx.doi.org/10.3390/app13085156.
Der volle Inhalt der QuelleEnjamuri, Naresh. "The Future of API Security: Post-Quantum Cryptography and Beyond." European Journal of Computer Science and Information Technology 13, no. 35 (2025): 98–110. https://doi.org/10.37745/ejcsit.2013/vol13n3598110.
Der volle Inhalt der QuelleAlupotha, Jayamine, Xavier Boyen, and Matthew McKague. "LACT+: Practical Post-Quantum Scalable Confidential Transactions." Cryptography 7, no. 2 (2023): 24. http://dx.doi.org/10.3390/cryptography7020024.
Der volle Inhalt der QuelleAlgazy, Kunbolat, Kairat Sakan, Saule Nyssanbayeva, and Oleg Lizunov. "Syrga2: Post-Quantum Hash-Based Signature Scheme." Computation 12, no. 6 (2024): 125. http://dx.doi.org/10.3390/computation12060125.
Der volle Inhalt der QuelleIavich, Maksim, Tamari Kuchukhidze, and Razvan Bocu. "Post-Quantum Digital Signature: Verkle-Based HORST." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 28. https://doi.org/10.3390/jcp5020028.
Der volle Inhalt der QuelleGhashghaei, Farshad Rahimi, Yussuf Ahmed, Nebrase Elmrabit, and Mehdi Yousefi. "Enhancing the Security of Classical Communication with Post-Quantum Authenticated-Encryption Schemes for the Quantum Key Distribution." Computers 13, no. 7 (2024): 163. http://dx.doi.org/10.3390/computers13070163.
Der volle Inhalt der Quelle