RATIONALE FOR IMPROVING AUTHENTICATION PROTOCOLS IN THE CONDITIONS OF POST-QUANTUM CRYPTOGRAPHY
Алла Гаврилова +4 more
openalex +1 more source
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. [PDF]
Almotiri SH.
europepmc +1 more source
Raw QPP-RNG randomness via system jitter across platforms: a NIST SP 800-90B evaluation. [PDF]
Vrana G, Lou D, Kuang R.
europepmc +1 more source
Post-Quantum Cryptography: Securing Future Communication Networks Against Quantum Attacks
openalex +2 more sources
A Systematic Literature Review on the Implementation and Challenges of Zero Trust Architecture Across Domains. [PDF]
Mushtaq S, Mohsin M, Mushtaq MM.
europepmc +1 more source
Theoretical and Practical Aspects of the Migration to Post Quantum Cryptography
Florian Schröck
openalex +2 more sources
Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
Muhammad Asghar Khan +4 more
openalex +1 more source
A simple and efficient attack on the Merkle-Hellman knapsack cryptosystem. [PDF]
Bi J, Su L, Peng H, Wang L.
europepmc +1 more source
Post-Quantum Secure Multi-Factor Authentication Protocol for Multi-Server Architecture. [PDF]
Wen Y, Su Y, Li W.
europepmc +1 more source

