Applied Postquantum Cryptography For Iot

but.event.date26.04.2018cs
but.event.titleStudent EEICT 2018cs
dc.contributor.authorPopelová, Lucie
dc.date.accessioned2019-03-04T10:05:38Z
dc.date.available2019-03-04T10:05:38Z
dc.date.issued2018cs
dc.description.abstractIn the last decades there has been such a fundamental development in the technologies including postquantum technologies. It is necessary to focus on postquantum cryptography which is able to resist quantum attacks and secure our systems. This work deals with postquantum protocols that are analysed and measured on the IoT device. Our experimental results are used to find the most effective postquantum protocol for key exchange suitable for IoT.en
dc.formattextcs
dc.format.extent123-125cs
dc.format.mimetypeapplication/pdfen
dc.identifier.citationProceedings of the 24th Conference STUDENT EEICT 2018. s. 123-125. ISBN 978-80-214-5614-3cs
dc.identifier.isbn978-80-214-5614-3
dc.identifier.urihttp://hdl.handle.net/11012/138188
dc.language.isoczcs
dc.publisherVysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologiícs
dc.relation.ispartofProceedings of the 24th Conference STUDENT EEICT 2018en
dc.relation.urihttp://www.feec.vutbr.cz/EEICT/cs
dc.rights© Vysoké učení technické v Brně, Fakulta elektrotechniky a komunikačních technologiícs
dc.rights.accessopenAccessen
dc.subjectIoTen
dc.subjectpostquantum cryptographyen
dc.subjectinformation securityen
dc.subjectpostquantum protocolsen
dc.titleApplied Postquantum Cryptography For Ioten
dc.type.driverconferenceObjecten
dc.type.statusPeer-revieweden
dc.type.versionpublishedVersionen
eprints.affiliatedInstitution.departmentFakulta elektrotechniky a komunikačních technologiícs
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
eeict2018-123.pdf
Size:
478.34 KB
Format:
Adobe Portable Document Format
Description: