Post-quantum cryptography and 5G security: tutorial.
T. Charles ClancyRobert W. McGwierLidong ChenPublished in: WiSec (2019)
Keyphrases
- information security
- encryption algorithms
- access control
- cellular automata
- security issues
- quantum computation
- network security
- security systems
- intrusion detection
- security requirements
- cryptographic algorithms
- public key cryptography
- security management
- security problems
- cryptographic protocols
- computer security
- security policies
- security level
- encryption scheme
- data encryption
- information assurance
- low cost
- information systems
- authentication scheme
- quantum mechanics
- key management
- security measures
- elliptic curve cryptography
- sensitive data