Search

Search Results

Showing 1-20 of 2,276 results
  1. Reference work entry

    Multivariate Cryptography

    Louis Goubin, Jacques Patarin, Bo-Yin Yang in Encyclopedia of Cryptography, Security and Privacy
    2025
  2. Living reference work entry

    Multivariate Cryptography

    Louis Goubin, Jacques Patarin, Bo-Yin Yang in Encyclopedia of Cryptography, Security and Privacy
    2024
  3. Conference proceedings

    Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8–10, 2025, Proceedings, Part I

    The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025,...

    Ruben Niederhagen, Markku-Juhani O. Saarinen in Lecture Notes in Computer Science
    2025
  4. Article

    QuantumResist: integrating shor’s algorithm, lattice-based cryptography, and quantum error correction for enhanced secure communication in post-quantum cryptography

    QuantumResist brings a new and improved way to secure communication in the quantum computing age with its use of lattice-based cryptography, quantum...

    N. Naveen Kumar, Balamurugan Souprayen, ... S. Suresh in The Journal of Supercomputing
    29 September 2025
  5. Conference proceedings

    Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8–10, 2025, Proceedings, Part II

    The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025,...

    Ruben Niederhagen, Markku-Juhani O. Saarinen in Lecture Notes in Computer Science
    2025
  6. Article

    On Quantum Transition in Cryptography through the Lens of Bibliometrics

    Abstract

    Cryptography, which has a history going back many centuries, is currently experiencing a transition from the classical paradigm to a quantum...

    01 June 2025
  7. Chapter

    Cryptography

    Before the modern age, cryptography was only used for encryption which is to use a secret key to convert readable text (cleartext) to unintelligible...
    Audun Jøsang in Cybersecurity
    2025
  8. Article
    Full access

    No Sum (NS) Sequence Based Post-Quantum Cryptography

    Quantum computing is becoming a significant technology for addressing complex problems, including those in cryptography. Traditional cryptography now...

    Bharat S. Rawal, Priyan M. Kumar, Raman Singh in SN Computer Science
    11 March 2025 Open access
  9. Conference paper

    Multivariate Blind Signatures Revisited

    In 2017, Petzoldt, Szepieniec, and Mohamed proposed a blind signature scheme, based on multivariate cryptography. This construction has been expanded...
    2025
  10. Article
    Full access

    The regular multivariate quadratic problem

    In this work, we introduce a novel variant of the multivariate quadratic problem, which is at the core of one of the most promising post-quantum...

    Antoine Joux, Rocco Mora in Designs, Codes and Cryptography
    28 August 2025 Open access
  11. Article

    Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices

    With the emergence of quantum computers, traditional cryptographic methods are vulnerable to attacks, emphasizing the need for post-quantum...

    Khwaja Mansoor, Mehreen Afzal, ... Yawar Abbas in Cluster Computing
    26 November 2024
  12. Conference proceedings

    Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part I

    ​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...

    Markku-Juhani Saarinen, Daniel Smith-Tone in Lecture Notes in Computer Science
    2024
  13. Conference proceedings

    Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II

    ​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...

    Markku-Juhani Saarinen, Daniel Smith-Tone in Lecture Notes in Computer Science
    2024
  14. Article
    Full access

    Exploring the landscape of post quantum cryptography: a bibliometric analysis of emerging trends and research impact

    With the emergence of quantum computers, classical cryptography is facing significant challenges. Address this compelling problem, it is the need of...

    Taniya Hasija, K. R. Ramkumar, ... Malvinder Singh Bali in Journal of Big Data
    26 September 2025 Open access
  15. Article

    An Effective Security Enhancement Scheme for Postquantum Cryptography Based Blockchain Networks in Cloud Computing

    Lattice-based cryptography is widely embraced for its strong security and versatility, particularly in postquantum public key (PK) systems. The...

    Sripriya Arunachalam in Automatic Control and Computer Sciences
    01 February 2025
  16. Article
    Full access

    Integrating code-based post-quantum cryptography into SSL TLS protocols through an interoperable hybrid framework

    The advancement of quantum computing creates a big threat to classical cryptographic protocols, including TLS, which is responsible for secure...

    Aasim Zafar, Syed Shamikh Iqbal in Discover Computing
    21 September 2025 Open access
  17. Article
    Full access

    Analyzing the research impact in post quantum cryptography through scientometric evaluation

    The accelerated pace of development in the Field of Quantum Computing is very alarming for many of the presently used cryptographic algorithms such...

    Basil Hanafi, Mohammad Ali in Discover Computing
    10 April 2025 Open access
  18. Article

    A New Multivariate Primitive from CCZ Equivalence

    Multivariate cryptography is one of the candidates for post-quantum cryptography. Multivariate schemes are usually constructed by applying two secret...

    Marco Calderini, Alessio Caminata, Irene Villa in Journal of Cryptology
    09 June 2025
  19. Conference paper

    Algebraic Cryptanalysis and Countermeasures of Lightweight Signature Scheme Based on Multivariate Quadratic Polynomials

    Multivariate Public Key Cryptography (MPKC) is a promising candidate for Post Quantum Cryptography (PQC) that ensures data security, information...
    Kuldeep Namdeo, Dheerendra Mishra, Namita Srivastava in Security and Privacy
    2025
  20. Conference proceedings

    Post-Quantum Cryptography 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16–18, 2023, Proceedings

    This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park,...

    Thomas Johansson, Daniel Smith-Tone in Lecture Notes in Computer Science
    2023
Did you find what you were looking for? Share feedback.