Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments

M Vidaković, K Miličević - Algorithms, 2023 - mdpi.com
The continuous development of quantum computing necessitates the development of
quantum-resistant cryptographic algorithms. In response to this demand, the National …

A Post-Quantum Digital Signature Using Verkle Trees and Lattices

M Iavich, T Kuchukhidze, R Bocu - Symmetry, 2023 - mdpi.com
Research on quantum computers has advanced significantly in recent years. If humanity
ever creates an effective quantum computer, many of the present public key cryptosystems …

[PDF][PDF] A Post-Quantum Digital Signature Using Verkle Trees and Lattices. Symmetry 2023, 15, 2165

M Iavich, T Kuchukhidze, R Bocu - 2023 - inspirehep.net
Research on quantum computers has advanced significantly in recent years. If humanity
ever creates an effective quantum computer, many of the present public key cryptosystems …

[PDF][PDF] NOVEL POST-QUANTUM DIGITAL SIGNATURE USING VERKLE TREES AND LATTICES

M Iavich, T Kuchukhidze, A Gagnidze - Scientific and practical cyber …, 2024 - journal.scsa.ge
Research on quantum computers has advanced significantly in recent years. If humanity
ever creates an effective quantum computer, many of the present public key cryptosystems …

MAAMSIC: Multimodal Authentication and Authorization Model for Security of IoT Communication via GSM Messaging in Sub-Saharan Africa

J Nabusoba, C Otieno, W Cheruiyot - Proceedings of the 12th International …, 2021 - Springer
Abstract Internet of Things (IoT) which consists of heterogeneous devices is an enabling
technology that can greatly improve the quality of lives in Sub-Saharan Africa. For instance …