Post-quantum and code-based cryptography—some prospective research directions

C Balamurugan, K Singh, G Ganesan, M Rajarajan - Cryptography, 2021 - mdpi.com
Cryptography has been used from time immemorial for preserving the confidentiality of
data/information in storage or transit. Thus, cryptography research has also been evolving …

A survey on code-based cryptography

V Weger, N Gassner, J Rosenthal - arxiv preprint arxiv:2201.07119, 2022 - arxiv.org
The improvements on quantum technology are threatening our daily cybersecurity, as a
capable quantum computer can break all currently employed asymmetric cryptosystems. In …

A Survey on Post Quantum Cryptosystems: Concept, Attacks, and Challenges in IoT Devices

SS Iqbal, A Zafar - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
Since the earliest times, cryptography has been used to safeguard the privacy of data or
information during transmission and reception. Cryptographic studies have progressed from …

Code-based post-quantum cryptography

C Balamurugan, K Singh, G Ganesan, M Rajarajan - 2021 - preprints.org
Cryptography has been used from time immemorial for preserving the confidentiality of
data/information in storage or in transit. Thus, cryptography research has also been evolving …

[PDF][PDF] A cryptographic system based on a new class of binary error-correcting codes

P Dömösi, C Hannusch… - Tatra Mountains …, 2019 - intapi.sciendo.com
In this paper we introduce a new cryptographic system which is based on the idea of
encryption due to [McEliece, RJ A public-key cryptosystem based on algebraic coding …

RFID authentication protocols based on error-correcting codes: a survey

N Chikouche, F Cherif, PL Cayrel… - Wireless Personal …, 2017 - Springer
Code-based cryptography is a very promising research area. It allows the construction of
different cryptographic mechanisms (eg identification protocol, public-key cryptosystem …

Optimizing Urban Intelligence: A Comprehensive Study on IoT With Edge Computing in Smart Cities

S Hooda, S Sarika, VK Sharma - Integration of AI, Quantum …, 2025 - igi-global.com
Urbanization and population growth are creating significant challenges for cities, including
increased demand for resources, traffic congestion, pollution, and waste managementThis …

Pre-Quantum to Post-Quantum Cryptography Transition: A Journey Connecting the Security and Challenges Eras

S Das, A Das - Integration of AI, Quantum Computing, and …, 2025 - igi-global.com
Quantum cryptography is a promising field for securing information against quantum
computers. Shor's algorithm, a quantum algorithm, can factor large prime numbers in …

[PDF][PDF] Code-Based Post-Quantum Cryptography

T Chithralekha, K Singh, G Ganeshvani… - Journal Not …, 2021 - academia.edu
Cryptography has been used from time immemorial for preserving the confidentiality of 1
data/information in storage or in transit. Thus, cryptography research has also been evolving …

Quantum and post-quantum key combination in a financial environment

E Gallego Estévez - 2023 - oa.upm.es
The intention of this work is to address the growing influence of quantum computing in
computer science, and more specifically in cybersecurity. To do so, foremost, an introduction …