如何正确和安全地开展后量子密码算法的相关实现(英文)

张帆, 杨博麟 - Journal of Cryptologic Research, 2023 - search.proquest.com
Security technologies are evolving at a rapid rate, and cryptographic algorithms are no
exception. One recent trend concerns the so-called post-quantum cryptography (PQC). The PQC …

[PDF][PDF] 王大為(WANG, DA-WEI)

王柏堯 - Conference on Multimedia (MM), 2013 - Citeseer
… 2013, “SPAM: A Secure Password Authentication Mechanism for Seamless Handover in
Proxy Mobile IPv6 Networks”, IEEE System Journal, 7, 102 – 113. (SCI) (IF: 1.27; SCI ranking: …

[PDF][PDF] 后量子加密算法的硬件实现综述

曹元, 陆旭, 吴彦泽, 谢浩东, 乔云凯, 姚恩义… - … Security 信息安全学报, 2021 - jcs.iie.ac.cn
… NIST post-quantum cryptography algorithm solicitation (round 2 and 3), outlines the current
main implementation methods of post-quantum encryption … their respective security, signature …

[PDF][PDF] Ⅲ. 大学院学位論文DISSERTATIONS

電気工学専攻 - ee.tu-tokyo.ac.jp
… Concerning that long-term security, it is essential to take account of post-quantum public…
secure authentication protocols by using a partial public-key encryption, and prove the protocols

6G 网络内生安全新范式探讨

JI Xinsheng, WU Jiangxing, JIN Liang… - Frontiers, 2022 - jzus.zju.edu.cn
security and traditional security. Furthermore, this paper describes the relevant security
and technical concepts under the guidance of the new paradigm of endogenous security. …