Amanote Research

Amanote Research

    RegisterSign In

Discover open access scientific publications

Search, annotate, share and cite publications


Publications by Arshiya I

Securing M2m Post-Quantum Secret Key Cryptography

IOSR Journal of Electronics and Communication Engineering
2014English

Related publications

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2016English

Post-Quantum Cryptography

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2019English

Architecture for the Secret-Key Bc3 Cryptography Algorithm

ITB Journal of Information and Communication Technology
2011English

The Problem of Quantum Computers in Cryptography and Post-Quantum Cryptography

2010English

Shared Cryptography With Embedded Session Key for Secret Audio

International Journal of Computer Applications
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy