1.
Akter MS, Rodriguez-Cardenas J, Shahriar H, Cuzzocrea A, Wu F. Quantum cryptography for enhanced network security: A comprehensive survey of research, developments, and future directions. In 2023 IEEE International Conference on Big Data (BigData) 2023 Dec 15 (pp. 5408-5417). IEEE.
2.
Aydeger A, Zeydan E, Yadav AK, Hemachandra KT, Liyanage M. Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography. In 2024 15th International Conference on Network of the Future (NoF) 2024 Oct 2 (pp. 195-203). IEEE..
3.
Kumar D, Mukherjee S, Das A. Polymer Nanocomposite-Based Electrolyte for Battery and Supercapacitor: A New Approach for Long-Lasting Energy Storage Device. In Exploring Nanomaterial Synthesis, Characterization, and Applications 2025 (pp. 151-168). IGI Global.
4.
Bos JW, Carlson B, Renes J, Rotaru M, Sprenkels D, Waters GP. Post-quantum secure boot on vehicle network processors. Cryptology ePrint Archive. 2022.
5.
Campos F, Meyer M, Sanwald S, Stöttinger M, Wang Y. Post-quantum cryptography for ECU security use cases. Ruhr-Universität Bochum; 2019 Oct 31.
6.
Sankhyan B, Sharma S, Singh M. Exploring Modern Cryptographic Algorithms: An Experimental Analysis. In2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2024 Jun 24 (pp. 1-7). IEEE.
7.
Fritzmann T, Vith J, Flórez D, Sepúlveda J. Post-quantum cryptography for automotive systems. Microprocessors and Microsystems. 2021 Nov 1;87:104379.
8.
Fritzmann T, Vith J, Sepúlveda J. Strengthening post-quantum security for automotive systems. In2020 23rd Euromicro Conference on Digital System Design (DSD) 2020 Aug 26 (pp. 570-576). IEEE.
9.
Hasan KF, Simpson L, Baee MA, Islam C, Rahman Z, Armstrong W, Gauravaram P, McKague M. A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies. IEEE Access. 2024 Jan 31.
10.
Hoque S, Aydeger A, Zeydan E. Exploring post quantum cryptography with quantum key distribution for sustainable mobile network architecture design. In Proceedings of the 4th Workshop on Performance and Energy Efficiency in Concurrent and Distributed Systems 2024 Jun 3 (pp. 9-16).
11.
Li S, Chen Y, Chen L, Liao J, Kuang C, Li K, Liang W, Xiong N. Post-quantum security: Opportunities and challenges. Sensors. 2023 Oct 26;23(21):8744.
12.
Liu YK, Moody D. Post-quantum cryptography and the quantum future of cybersecurity. Physical review applied. 2024 Apr 1;21(4):040501.
13.
Malina L, Dzurenda P, Ricci S, Hajny J, Srivastava G, Matulevi?ius R, Affia AA, Laurent M, Sultan NH, Tang Q. Post-quantum era privacy protection for intelligent infrastructures. IEEE Access. 2021 Feb 24;9:36038-77.
14.
La Manna M, Perazzo P, Treccozzi L, Dini G. Assessing the cost of quantum security for automotive over-the-air updates. In2021 IEEE Symposium on Computers and Communications (ISCC) 2021 Sep 5 (pp. 1-6). IEEE.
15.
Zubair S, Ahmed HM. An In-Depth Comparative Analysis of Cryptographic Techniques for Ensuring Data Privacy in E-Applications. In2024 3rd International Conference for Advancement in Technology (ICONAT) 2024 Sep 6 (pp. 1-8). IEEE.
16.
Pradhan T, Patil P. Quantum Cryptography for Secure Autonomous Vehicle Networks: A Review. In2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) 2024 Feb 24 (pp. 1-10). IEEE.
17.
Ravi P, Sundar VK, Chattopadhyay A, Bhasin S, Easwaran A. Authentication protocol for secure automotive systems: Benchmarking post-quantum cryptography. In 2020 IEEE International Symposium on Circuits and Systems (ISCAS) 2020 Oct 12 (pp. 1-5). IEEE.
18.
Sonko S, Ibekwe KI, Ilojianya VI, Etukudoh EA, Fabuyide A. Quantum cryptography and US digital security: a comprehensive review: investigating the potential of quantum technologies in creating unbreakable encryption and their future in national security. Computer Science & IT Research Journal. 2024 Feb 18;5(2):390-414.
19.
Shamshad S, Riaz F, Riaz R, Rizvi SS, Abdulla S. An enhanced architecture to resolve public-key cryptographic issues in the internet of things (IoT), employing quantum computing supremacy. Sensors. 2022 Oct 25;22(21):8151.
20.
Rakhra M, Singh A, Singh D, Kaur B. Hybrid Cryptography in Cloud Computing. In2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) 2024 Mar 14 (pp. 1-7). IEEE.
21.
Tiexiong S, Shiwen Y, Zhiqin C, Xiao-lei LI, Bao-cheng Z, Yi Z. Review on Dynamic Simulation Model of Complex Structural Joints [J]. Journal of North China Institute of Technology. 2001;22(3):218-22.
22.
Wang W, Stöttinger M. Post-quantum secure architectures for automotive hardware secure modules. Cryptology ePrint Archive. 2020.
23.
Zeydan E, Turk Y, Aksoy B, Ozturk SB. Recent advances in post-quantum cryptography for networks: A survey. In2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ) 2022 Feb 26 (pp. 1-8). IEEE.
24.
Zhu Y, Liu Y, Wu M, Li J, Liu S, Zhao J. Research on secure communication on in-vehicle Ethernet based on post-quantum algorithm NTRUEncrypt. Electronics. 2022 Mar 9;11(6):856.