Search

Search Results

Showing 1-20 of 3,292 results
  1. Reference work entry

    Multivariate Cryptography

    Louis Goubin, Jacques Patarin, Bo-Yin Yang in Encyclopedia of Cryptography, Security and Privacy
    2025
  2. Article
    Full access

    Quantum-resilient framework for healthcare data security using multivariate polynomial cryptography

    The rapid advancement of quantum computing presents a significant threat to traditional cryptographic systems, particularly in sectors that handle...

    22 September 2025
  3. Living reference work entry

    Multivariate Cryptography

    Louis Goubin, Jacques Patarin, Bo-Yin Yang in Encyclopedia of Cryptography, Security and Privacy
    2024
  4. Chapter

    Post-Quantum Cryptography

    This chapter is devoted to post-quantum cryptography (PQC) concepts. Following the introduction, the following lattice-based cryptography concepts...
    2025
  5. Article
    Full access

    Post-quantum Cryptography: A Review on Cryptographic Solutions for the Era of Quantum Computing

    The emergence of Quantum Computing (QC) presents a substantial risk to conventional cryptography systems, many of which are vulnerable to Shor’s...

    Manmohan Singh, Sandeep Kumar Sood, Munish Bhatia in Archives of Computational Methods in Engineering
    24 September 2025
  6. Conference proceedings

    Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8–10, 2025, Proceedings, Part I

    The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025,...

    Ruben Niederhagen, Markku-Juhani O. Saarinen in Lecture Notes in Computer Science
    2025
  7. Conference proceedings

    Post-Quantum Cryptography 16th International Workshop, PQCrypto 2025, Taipei, Taiwan, April 8–10, 2025, Proceedings, Part II

    The two-volume set LNCS 15577 + 15578 constitutes the proceedings of the 16th International Workshop on Post-Quantum Cryptography, PQCrypto 2025,...

    Ruben Niederhagen, Markku-Juhani O. Saarinen in Lecture Notes in Computer Science
    2025
  8. Article

    QuantumResist: integrating shor’s algorithm, lattice-based cryptography, and quantum error correction for enhanced secure communication in post-quantum cryptography

    QuantumResist brings a new and improved way to secure communication in the quantum computing age with its use of lattice-based cryptography, quantum...

    N. Naveen Kumar, Balamurugan Souprayen, ... S. Suresh in The Journal of Supercomputing
    29 September 2025
  9. Article

    On Quantum Transition in Cryptography through the Lens of Bibliometrics

    Abstract

    Cryptography, which has a history going back many centuries, is currently experiencing a transition from the classical paradigm to a quantum...

    01 June 2025
  10. Chapter

    Cryptography

    Before the modern age, cryptography was only used for encryption which is to use a secret key to convert readable text (cleartext) to unintelligible...
    Audun Jøsang in Cybersecurity
    2025
  11. Article
    Full access

    No Sum (NS) Sequence Based Post-Quantum Cryptography

    Quantum computing is becoming a significant technology for addressing complex problems, including those in cryptography. Traditional cryptography now...

    Bharat S. Rawal, Priyan M. Kumar, Raman Singh in SN Computer Science
    11 March 2025 Open access
  12. Conference paper

    Multivariate Blind Signatures Revisited

    In 2017, Petzoldt, Szepieniec, and Mohamed proposed a blind signature scheme, based on multivariate cryptography. This construction has been expanded...
    2025
  13. Article
    Full access

    The regular multivariate quadratic problem

    In this work, we introduce a novel variant of the multivariate quadratic problem, which is at the core of one of the most promising post-quantum...

    Antoine Joux, Rocco Mora in Designs, Codes and Cryptography
    28 August 2025 Open access
  14. Article

    Lattice-Based Cryptography: A Survey

    Most of current public key cryptosystems would be vulnerable to the attacks of the future quantum computers. Post-quantum cryptography offers...

    Xiaoyun Wang, Guangwu Xu, Yang Yu in Chinese Annals of Mathematics, Series B
    30 November 2023
  15. Article

    Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices

    With the emergence of quantum computers, traditional cryptographic methods are vulnerable to attacks, emphasizing the need for post-quantum...

    Khwaja Mansoor, Mehreen Afzal, ... Yawar Abbas in Cluster Computing
    26 November 2024
  16. Conference proceedings

    Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part I

    ​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...

    Markku-Juhani Saarinen, Daniel Smith-Tone in Lecture Notes in Computer Science
    2024
  17. Conference proceedings

    Post-Quantum Cryptography 15th International Workshop, PQCrypto 2024, Oxford, UK, June 12–14, 2024, Proceedings, Part II

    ​The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop, PQCrypto 2024, held in Oxford, UK,...

    Markku-Juhani Saarinen, Daniel Smith-Tone in Lecture Notes in Computer Science
    2024
  18. Article
    Full access

    Exploring the landscape of post quantum cryptography: a bibliometric analysis of emerging trends and research impact

    With the emergence of quantum computers, classical cryptography is facing significant challenges. Address this compelling problem, it is the need of...

    Taniya Hasija, K. R. Ramkumar, ... Malvinder Singh Bali in Journal of Big Data
    26 September 2025 Open access
  19. Article
    Full access

    Review on lightweight cryptography techniques and steganography techniques for IoT environment

    In the modern world, technology has connected to our day-to-day life in different forms. The Internet of Things (IoT) has become an innovative...

    Sangeetha Supriya K., Jeno Lovesum S. P. in International Journal of System Assurance Engineering and Management
    21 August 2024
  20. Article

    An Effective Security Enhancement Scheme for Postquantum Cryptography Based Blockchain Networks in Cloud Computing

    Lattice-based cryptography is widely embraced for its strong security and versatility, particularly in postquantum public key (PK) systems. The...

    Sripriya Arunachalam in Automatic Control and Computer Sciences
    01 February 2025
Did you find what you were looking for? Share feedback.