2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA) 2021
DOI: 10.1109/iiceta51758.2021.9717867
|View full text |Cite
|
Sign up to set email alerts
|

The Role of Quantum and Post-Quantum Techniques in Wireless Network Security - Status, Challenges and Future Trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 45 publications
0
3
0
Order By: Relevance
“…The raw key can be created by combining the two lists, but it is not safe because Eve can eavesdrop on selected data while in transit. Getting the right key entails four primary steps: coarse key sifting, error assessment, error remedy, and privacy intensification [40,40].…”
Section: Via Public Channel (Two-way Communication)mentioning
confidence: 99%
See 2 more Smart Citations
“…The raw key can be created by combining the two lists, but it is not safe because Eve can eavesdrop on selected data while in transit. Getting the right key entails four primary steps: coarse key sifting, error assessment, error remedy, and privacy intensification [40,40].…”
Section: Via Public Channel (Two-way Communication)mentioning
confidence: 99%
“…Those on the receiving end must produce both the public and private keys. Many distinct asymmetric encryption methods [45] are capable of generating such keys. To facilitate communication between themselves, Bob shares his public key with Alice, as depicted in Figure 3b.…”
Section: Threats To Current State Cryptography Systemsmentioning
confidence: 99%
See 1 more Smart Citation