Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
post-quantum security (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(5/219)
Export
export all inquiry results
(1)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Keyless signature infrastructure and PKI : hash-tree signatures in pre- and post-quantum world
Buldas, Ahto
;
Laanoja, Risto
;
Truu, Ahto
International journal of services technology and management
2017
/
p. 117-130 : ill
https://doi.org/10.1504/IJSTM.2017.10002708
Journal metrics at Scopus
Article at Scopus
journal article EST
/
journal article ENG
Number of records 1, displaying
1 - 1
keyword
195
1.
post-quantum security
2.
polynomial multiplication; post-quantum cryptography
3.
post-quantum
4.
post-quantum cryptography
5.
post-quantum one-way functions
6.
ameliorated quantum class topper optimization (A-QCTO)
7.
external quantum efficiency
8.
parabolic quantum well
9.
parabolic quantum wells
10.
quantum attack
11.
quantum chemical calculations
12.
quantum communication
13.
quantum communication chanell
14.
quantum computing
15.
quantum cryptography
16.
quantum detectors
17.
quantum dots (QDs)
18.
quantum efficiency
19.
quantum groups
20.
quantum internet
21.
quantum logic
22.
quantum matrix spaces
23.
quantum noise
24.
Quantum state verification
25.
quantum structures
26.
quantum tunneling
27.
quantum well
28.
quantum wells
29.
chemical post-deposition treatment
30.
coating post-treatment
31.
conflicts in post-Soviet space
32.
EU post-2020 biodiversity strategy
33.
ex post analysis
34.
Physicochemical pre- and post-treatment
35.
post deposition annealing
36.
post normal science
37.
post translational modifications
38.
post-analysis of rules
39.
post-annealing treatment
40.
post-blockchain
41.
post-Brexit
42.
post-buckling response
43.
post-capitalism
44.
post-combustion
45.
Post-combustion capture
46.
post-communist
47.
post-communist regimes
48.
post-communist transition
49.
post-conflict
50.
post-conflict justice
51.
post-conflict reconstruction
52.
postconsumer textile waste
53.
post-consumer textile wastes
54.
post-COVID recovery
55.
Post-deposition treatment
56.
post-disaster housing reconstruction
57.
post-glacial land uplift
58.
post-granulation treatment
59.
post-growth
60.
Post-Hoc explainability
61.
post-hoc explanation
62.
post-humanism
63.
post-mining land use
64.
post-mortem
65.
post-normal science
66.
post-NPM
67.
post-politics
68.
post-positivism
69.
post-precipitated tertiary sludge
70.
post-processing
71.
post-release rehabilitation
72.
post-secondary education
73.
post-Shannon communication
74.
post-socialism
75.
post-socialist
76.
post-socialist city
77.
post-socialist countries
78.
post-Soviet
79.
post-Soviet bilingualism
80.
post-Soviet countries
81.
post-soviet country
82.
post-soviet politics
83.
post-Soviet region
84.
Post–Soviet states
85.
post‐transcriptional regulation
86.
post-transitional country
87.
post-traumatic stress disorder
88.
post-traumatic stress disorder (PTSD)
89.
post-treatment
90.
post-truth
91.
post-ultimate response
92.
ad-hoc sensor networks security
93.
Automatic Security Verification
94.
Blockchain security
95.
cache security
96.
communication system security
97.
comprehensive system of economic security
98.
computer security
99.
cooperative security dilemma
100.
cyber security
101.
cyber security education
102.
cyber security exercises
103.
cyber security monitoring
104.
cyber security strategies
105.
cyber-security
106.
data security
107.
development of security cameras
108.
digital security practices
109.
drinking water security
110.
economic security
111.
economic security of enterprise
112.
emotional security
113.
energy security
114.
energy security indicator
115.
Estonian information security standard
116.
graded security
117.
hardware security
118.
hardware security primitive
119.
human security
120.
information security
121.
information security and privacy
122.
internal security
123.
international security
124.
investment and innovation security
125.
IPv6 security
126.
IT security
127.
IT security management
128.
job security
129.
long-term security
130.
metadata model for security measures
131.
Middle Eastern security
132.
Mobile security
133.
national cyber security strategy
134.
national security
135.
NATO. Science for Peace and Security Program
136.
network security
137.
network security monitoring
138.
OSCE (Organization for Security and Co-operation in Europe)
139.
passenger’s security
140.
policy-based routing security
141.
political and security cultures
142.
power system security
143.
quantitative security
144.
regional security
145.
RISC-V Security Verification
146.
safety and security testing
147.
security
148.
security adaptation
149.
security alert prioritization
150.
security analysis
151.
security and justice (AFSJ)
152.
Security and political science
153.
security and privacy
154.
security and privacy in smart grids
155.
Security Assertion Mining
156.
security closure
157.
Security Coverage
158.
security dataset
159.
security dilemma
160.
Security evaluation
161.
security evaluation instruments
162.
Security limitations
163.
security log analysis
164.
security management
165.
security model
166.
security monitoring
167.
security notion
168.
security objectives
169.
security of data
170.
security of supply
171.
security operation center
172.
security operations center
173.
security patterns
174.
security policy
175.
security problem definition
176.
security proof
177.
security protocols
178.
security requirements
179.
security requirements engineering
180.
security risk assessment
181.
security risk management
182.
security risks
183.
security strategies
184.
security systems for military objects
185.
security testing
186.
security training
187.
security verification
188.
security-by-design
189.
social security planning
190.
societal security
191.
system of economic security
192.
system security
193.
terrorism security
194.
transmission System Security
195.
voting privacy and security
author
14
1.
Post, Annaliisa
2.
Post, Eda
3.
Post, H.
4.
Post, Liisa
5.
Post, P.
6.
Post, Piia
7.
Post, R.
8.
Post, Ruuben
9.
Post, T.
10.
Post, Tarmo
11.
Post, Tiit
12.
Post, Triine
13.
Post, V.
14.
Post, Voldemar
subject term
5
1.
Eesti Post
2.
e-post
3.
post
4.
National Computer Security Incident Response Teams (N-CSIRTs)
5.
USS Security Eesti AS
CV
3
1.
Post, Tarmo
2.
Post, Tiit
3.
Post, Voldemar 1897-1970
name of the person
2
1.
Post, Tarmo
2.
Post, Voldemar, 1897-1970
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT