
Computer Source — Search 1
Keywords: Cryptography or Encryption and Post-Quantum and Quantum
Limiter: Published from 1995 to 2021
Results: 6331
Computer Source — Search 2
Keywords: Lattice_Based or RSA and Quantum and Encryption
Limiter: Published from 1995 to 2021
Results: 104

New Sources:
Source 1:
Sowjanya, K., Dasgupta, M., & Ray, S. (2020). An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems. International Journal of Information Security, 19(1), 129–146. https://doi.org/10.1007/s10207-019-00464-9
Subject Terms
ELLIPTIC curve cryptography
QUANTUM cryptography
BODY area networks
WIRELESS channels
DATA security
WIRELESS communications
Source 2:
Moon, J., Jung, I. Y., & Park, J. H. (2018). IoT application protection against power analysis attack. Computers & Electrical Engineering, 67, 566–578. https://doi.org/10.1016/j.compeleceng.2018.02.030
Subject Terms
INTERNET of things
QUANTUM computing
PUBLIC key cryptography
EAVESDROPPING
RSA algorithm
PREVENTION
Benjamin, I am glad you found better new sources that suit your specific research. Were you as surprised as I was by changing the advanced search just by a little and seeing completely different results? I think that we will find more and better sources if we change the settings to the advance search. I hope those new sources are just what you were looking for. Great work!