NIST Post-Quantum Cryptography- A Hardware Evaluation Study. Basu, K., Soni, D., Nabeel, M., & Karri, R. IACR Cryptol. ePrint Arch., 2019:47, 2019. Paper bibtex @article{DBLP:journals/iacr/BasuSNK19,
author = {Kanad Basu and
Deepraj Soni and
Mohammed Nabeel and
Ramesh Karri},
title = {{NIST} Post-Quantum Cryptography- {A} Hardware Evaluation Study},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2019},
pages = {47},
year = {2019},
url = {https://eprint.iacr.org/2019/047},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BasuSNK19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"wkzYEj47TkdxzymGp","bibbaseid":"basu-soni-nabeel-karri-nistpostquantumcryptographyahardwareevaluationstudy-2019","author_short":["Basu, K.","Soni, D.","Nabeel, M.","Karri, R."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Kanad"],"propositions":[],"lastnames":["Basu"],"suffixes":[]},{"firstnames":["Deepraj"],"propositions":[],"lastnames":["Soni"],"suffixes":[]},{"firstnames":["Mohammed"],"propositions":[],"lastnames":["Nabeel"],"suffixes":[]},{"firstnames":["Ramesh"],"propositions":[],"lastnames":["Karri"],"suffixes":[]}],"title":"NIST Post-Quantum Cryptography- A Hardware Evaluation Study","journal":"IACR Cryptol. ePrint Arch.","volume":"2019","pages":"47","year":"2019","url":"https://eprint.iacr.org/2019/047","timestamp":"Mon, 11 May 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/iacr/BasuSNK19.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/BasuSNK19,\n author = {Kanad Basu and\n Deepraj Soni and\n Mohammed Nabeel and\n Ramesh Karri},\n title = {{NIST} Post-Quantum Cryptography- {A} Hardware Evaluation Study},\n journal = {{IACR} Cryptol. ePrint Arch.},\n volume = {2019},\n pages = {47},\n year = {2019},\n url = {https://eprint.iacr.org/2019/047},\n timestamp = {Mon, 11 May 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/BasuSNK19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Basu, K.","Soni, D.","Nabeel, M.","Karri, R."],"key":"DBLP:journals/iacr/BasuSNK19","id":"DBLP:journals/iacr/BasuSNK19","bibbaseid":"basu-soni-nabeel-karri-nistpostquantumcryptographyahardwareevaluationstudy-2019","role":"author","urls":{"Paper":"https://eprint.iacr.org/2019/047"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/08/1330.bib","dataSources":["K9SRKdiQNw6WZkhae"],"keywords":[],"search_terms":["nist","post","quantum","cryptography","hardware","evaluation","study","basu","soni","nabeel","karri"],"title":"NIST Post-Quantum Cryptography- A Hardware Evaluation Study","year":2019}