… NIST post-quantumcryptography algorithm solicitation (round 2 and 3), outlines the current main implementation methods of post-quantumencryption … their respective security, signature …
… Concerning that long-term security, it is essential to take account of post-quantum public… secureauthenticationprotocols by using a partial public-key encryption, and prove the protocols …
JI Xinsheng, WU Jiangxing, JIN Liang… - Frontiers, 2022 - jzus.zju.edu.cn
… security and traditional security. Furthermore, this paper describes the relevant security … and technical concepts under the guidance of the new paradigm of endogenous security. …