Post-quantum and code-based cryptography—some prospective research directions
C Balamurugan, K Singh, G Ganesan, M Rajarajan - Cryptography, 2021 - mdpi.com
Cryptography has been used from time immemorial for preserving the confidentiality of
data/information in storage or transit. Thus, cryptography research has also been evolving …
data/information in storage or transit. Thus, cryptography research has also been evolving …
A survey on code-based cryptography
The improvements on quantum technology are threatening our daily cybersecurity, as a
capable quantum computer can break all currently employed asymmetric cryptosystems. In …
capable quantum computer can break all currently employed asymmetric cryptosystems. In …
A Survey on Post Quantum Cryptosystems: Concept, Attacks, and Challenges in IoT Devices
Since the earliest times, cryptography has been used to safeguard the privacy of data or
information during transmission and reception. Cryptographic studies have progressed from …
information during transmission and reception. Cryptographic studies have progressed from …
Code-based post-quantum cryptography
C Balamurugan, K Singh, G Ganesan, M Rajarajan - 2021 - preprints.org
Cryptography has been used from time immemorial for preserving the confidentiality of
data/information in storage or in transit. Thus, cryptography research has also been evolving …
data/information in storage or in transit. Thus, cryptography research has also been evolving …
[PDF][PDF] A cryptographic system based on a new class of binary error-correcting codes
P Dömösi, C Hannusch… - Tatra Mountains …, 2019 - intapi.sciendo.com
In this paper we introduce a new cryptographic system which is based on the idea of
encryption due to [McEliece, RJ A public-key cryptosystem based on algebraic coding …
encryption due to [McEliece, RJ A public-key cryptosystem based on algebraic coding …
RFID authentication protocols based on error-correcting codes: a survey
Code-based cryptography is a very promising research area. It allows the construction of
different cryptographic mechanisms (eg identification protocol, public-key cryptosystem …
different cryptographic mechanisms (eg identification protocol, public-key cryptosystem …
Optimizing Urban Intelligence: A Comprehensive Study on IoT With Edge Computing in Smart Cities
S Hooda, S Sarika, VK Sharma - Integration of AI, Quantum …, 2025 - igi-global.com
Urbanization and population growth are creating significant challenges for cities, including
increased demand for resources, traffic congestion, pollution, and waste managementThis …
increased demand for resources, traffic congestion, pollution, and waste managementThis …
Pre-Quantum to Post-Quantum Cryptography Transition: A Journey Connecting the Security and Challenges Eras
Quantum cryptography is a promising field for securing information against quantum
computers. Shor's algorithm, a quantum algorithm, can factor large prime numbers in …
computers. Shor's algorithm, a quantum algorithm, can factor large prime numbers in …
[PDF][PDF] Code-Based Post-Quantum Cryptography
Cryptography has been used from time immemorial for preserving the confidentiality of 1
data/information in storage or in transit. Thus, cryptography research has also been evolving …
data/information in storage or in transit. Thus, cryptography research has also been evolving …
Quantum and post-quantum key combination in a financial environment
E Gallego Estévez - 2023 - oa.upm.es
The intention of this work is to address the growing influence of quantum computing in
computer science, and more specifically in cybersecurity. To do so, foremost, an introduction …
computer science, and more specifically in cybersecurity. To do so, foremost, an introduction …