Skip to main content
Log in

Post-Quantum Cryptography and its Application to the IoT

(Extended Abstract)

  • HAUPTBEITRAG
  • POST-QUANTUM CRYPTOGRAPHY AND ITS APPLICATION
  • Published:
Informatik Spektrum Aims and scope

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. NIST CSRC (2017) Post-quantum cryptography standardization – Post-quantum cryptography. https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization

  2. Shor (1994) Algorithms for quantum computation: discrete logarithms and factoring. FOCS 1994:124–134

  3. de Touzalin M, Heijman C, Murray C (2016) Quantum Manifesto – A New Era of Technology

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juliane Krämer.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Krämer, J. Post-Quantum Cryptography and its Application to the IoT. Informatik Spektrum 42, 343–344 (2019). https://doi.org/10.1007/s00287-019-01200-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00287-019-01200-2

Navigation