These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
152 related articles for article (PubMed ID: 36236316)
1. A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications. Costa VLRD; López J; Ribeiro MV Sensors (Basel); 2022 Sep; 22(19):. PubMed ID: 36236316 [TBL] [Abstract][Full Text] [Related]
2. A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. Lee J; Kim W; Kim JH Sensors (Basel); 2023 Nov; 23(23):. PubMed ID: 38067782 [TBL] [Abstract][Full Text] [Related]
6. Quantum Misuse Attack on Frodo. Wang Y; Jiang H; Ma Z Entropy (Basel); 2022 Oct; 24(10):. PubMed ID: 37420438 [TBL] [Abstract][Full Text] [Related]
7. Secure IoT in the Era of Quantum Computers-Where Are the Bottlenecks? Schöffel M; Lauer F; Rheinländer CC; Wehn N Sensors (Basel); 2022 Mar; 22(7):. PubMed ID: 35408099 [TBL] [Abstract][Full Text] [Related]
8. Transitioning organizations to post-quantum cryptography. Joseph D; Misoczki R; Manzano M; Tricot J; Pinuaga FD; Lacombe O; Leichenauer S; Hidary J; Venables P; Hansen R Nature; 2022 May; 605(7909):237-243. PubMed ID: 35546191 [TBL] [Abstract][Full Text] [Related]
9. Password authenticated key exchange-based on Kyber for mobile devices. Seyhan K; Akleylek S; Dursun AF PeerJ Comput Sci; 2024; 10():e1960. PubMed ID: 38660167 [TBL] [Abstract][Full Text] [Related]
10. Quantum attack-resistent certificateless multi-receiver signcryption scheme. Li H; Chen X; Pang L; Shi W PLoS One; 2013; 8(6):e49141. PubMed ID: 23967037 [TBL] [Abstract][Full Text] [Related]
11. A Rainbow-Based Authentical Scheme for Securing Smart Connected Health Systems. Yi H; Li J; Lin Q; Wang H; Song H; Ming Z; Nie Z J Med Syst; 2019 Jul; 43(8):276. PubMed ID: 31280402 [TBL] [Abstract][Full Text] [Related]
12. DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V. Chen Y; Chen H; Chen S; Han C; Ye W; Liu Y; Zhou H Sensors (Basel); 2022 Aug; 22(16):. PubMed ID: 36015746 [TBL] [Abstract][Full Text] [Related]
13. An efficient heterogeneous signcryption for smart grid. Jin C; Chen G; Yu C; Shan J; Zhao J; Jin Y PLoS One; 2018; 13(12):e0208311. PubMed ID: 30562351 [TBL] [Abstract][Full Text] [Related]
14. Software implementation of systematic polar encoding based PKC-SPE cryptosystem for quantum cybersecurity. Redhu R; Narwal E; Gupta S; Hooda R; Ahlawat S; Khurana R Sci Rep; 2024 May; 14(1):9994. PubMed ID: 38693269 [TBL] [Abstract][Full Text] [Related]
15. All optical metropolitan quantum key distribution network with post-quantum cryptography authentication. Yang YH; Li PY; Ma SZ; Qian XC; Zhang KY; Wang LJ; Zhang WL; Zhou F; Tang SB; Wang JY; Yu Y; Zhang Q; Pan JW Opt Express; 2021 Aug; 29(16):25859-25867. PubMed ID: 34614905 [TBL] [Abstract][Full Text] [Related]
16. High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems. Zhang Z; Wang X; Hao Q; Xu D; Zhang J; Liu J; Ma J Micromachines (Basel); 2021 May; 12(5):. PubMed ID: 34063441 [TBL] [Abstract][Full Text] [Related]
17. Identity-Based Proxy Signature with Message Recovery over NTRU Lattice. Wu F; Zhou B; Zhang X Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981342 [TBL] [Abstract][Full Text] [Related]
18. Post-quantum cryptography. Bernstein DJ; Lange T Nature; 2017 Sep; 549(7671):188-194. PubMed ID: 28905891 [TBL] [Abstract][Full Text] [Related]