Cargando…
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms
Recent developments in quantum computing have shed light on the shortcomings of the conventional public cryptosystem. Even while Shor’s algorithm cannot yet be implemented on quantum computers, it indicates that asymmetric key encryption will not be practicable or secure in the near future. The Nati...
Autores principales: | Farooq, Sana, Altaf, Ayesha, Iqbal, Faiza, Thompson, Ernesto Bautista, Vargas, Debora Libertad Ramírez, Díez, Isabel de la Torre, Ashraf, Imran |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10303738/ https://www.ncbi.nlm.nih.gov/pubmed/37420546 http://dx.doi.org/10.3390/s23125379 |
Ejemplares similares
-
Quantum cryptography beyond quantum key distribution
por: Broadbent, Anne, et al.
Publicado: (2015) -
Tight finite-key analysis for quantum cryptography
por: Tomamichel, Marco, et al.
Publicado: (2012) -
Quantum cryptography: from key distribution to conference key agreement
por: Grasselli, Federico
Publicado: (2021) -
Physical-Layer Security, Quantum Key Distribution, and Post-Quantum Cryptography
por: Djordjevic, Ivan B.
Publicado: (2022) -
Quantum communications and cryptography /
Publicado: (2006)