Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments
M Vidaković, K Miličević - Algorithms, 2023 - mdpi.com
The continuous development of quantum computing necessitates the development of
quantum-resistant cryptographic algorithms. In response to this demand, the National …
quantum-resistant cryptographic algorithms. In response to this demand, the National …
A Post-Quantum Digital Signature Using Verkle Trees and Lattices
Research on quantum computers has advanced significantly in recent years. If humanity
ever creates an effective quantum computer, many of the present public key cryptosystems …
ever creates an effective quantum computer, many of the present public key cryptosystems …
[PDF][PDF] A Post-Quantum Digital Signature Using Verkle Trees and Lattices. Symmetry 2023, 15, 2165
Research on quantum computers has advanced significantly in recent years. If humanity
ever creates an effective quantum computer, many of the present public key cryptosystems …
ever creates an effective quantum computer, many of the present public key cryptosystems …
[PDF][PDF] NOVEL POST-QUANTUM DIGITAL SIGNATURE USING VERKLE TREES AND LATTICES
Research on quantum computers has advanced significantly in recent years. If humanity
ever creates an effective quantum computer, many of the present public key cryptosystems …
ever creates an effective quantum computer, many of the present public key cryptosystems …
MAAMSIC: Multimodal Authentication and Authorization Model for Security of IoT Communication via GSM Messaging in Sub-Saharan Africa
Abstract Internet of Things (IoT) which consists of heterogeneous devices is an enabling
technology that can greatly improve the quality of lives in Sub-Saharan Africa. For instance …
technology that can greatly improve the quality of lives in Sub-Saharan Africa. For instance …