共 50 条
- [1] Implementing Post-quantum Cryptography for Developers PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 73 - 83
- [5] Challenges and Rewards of Implementing and Benchmarking Post-Quantum Cryptography in Hardware PROCEEDINGS OF THE 2018 GREAT LAKES SYMPOSIUM ON VLSI (GLSVLSI'18), 2018, : 359 - 364
- [6] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
- [7] Applications of Post-Quantum Cryptography PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 49 - 57
- [8] A note on quantum security for post-quantum cryptography Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
- [9] A Note on Quantum Security for Post-Quantum Cryptography POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
- [10] Post-quantum cryptography and the quantum future of cybersecurity PHYSICAL REVIEW APPLIED, 2024, 21 (04):