2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) 2018
DOI: 10.1109/upcon.2018.8596905
|View full text |Cite
|
Sign up to set email alerts
|

Three Party Key Sharing Protocol Using Polynomial Rings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Post-quantum cryptography (PQC) is the term for the new encryption techniques that researchers are creating and establishing to counter the threat posed by quantum computers. These new techniques are meant to be opposed to attacks from computers, both classical and quantum [1][2][3][4][5][6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Post-quantum cryptography (PQC) is the term for the new encryption techniques that researchers are creating and establishing to counter the threat posed by quantum computers. These new techniques are meant to be opposed to attacks from computers, both classical and quantum [1][2][3][4][5][6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%