Amanote Research

Amanote Research

    RegisterSign In

Securing M2m Post-Quantum Secret Key Cryptography

IOSR Journal of Electronics and Communication Engineering
doi 10.9790/2834-09132227
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2014

Authors
Arshiya ISekar R.
Publisher

IOSR Journals


Related search

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2019English

Architecture for the Secret-Key Bc3 Cryptography Algorithm

ITB Journal of Information and Communication Technology
2011English

The Problem of Quantum Computers in Cryptography and Post-Quantum Cryptography

2010English

Shared Cryptography With Embedded Session Key for Secret Audio

International Journal of Computer Applications
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy