Xie, J., Tan, X., & Tan, L., 2022. CR-BA: Public Key Infrastructure Certificate Revocation Scheme Based on Blockchain and Accumulator. School of Computer Science, Sichuan Normal University, Chengdu, China; Institute of Computer Science, Chinese Academy of Sciences, Beijing, China. Available at: jkxy_tl@sicnu.edu.cn.
Juniawan, S., 2022. Key Management. In: *Cryptographic Security Concerns on Timestamp Sharing via a Public Channel in Quantum-Key-Distribution Systems*. Springer, pp.105-117. https://doi.org/10.1007/978-1-4842-7486-6_8
Papadopoulos, I. and Wang, J., 2023. Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber. *Cryptography*, 7(1), p.2. https://doi.org/10.3390/cryptography7010002.
Dang, V.B., Mohajerani, K. and Gaj, K., 2023. High-Speed Hardware Architectures and FPGA Benchmarking of CRYSTALS-Kyber, NTRU, and Saber. *IEEE Transactions on Computers*, 72(2), pp.306-320. https://doi.org/10.1109/tc.2022.3222954.
Wang, X., Luo, T. and Li, J., 2018. A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes. *Security and Communication Networks*, 2018, pp.1-14. https://doi.org/10.1155/2018/8706940.
A. Yeboah-Ofori, C. K. Agbodza, F. A. Opoku-Boateng, I. Darvishi and F. Sbai, "Applied Cryptography in Network Systems Security for Cyberattack Prevention," 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), France, 2021, pp. 43-48, doi: 10.1109/ICSIoT55070.2021.00017. keywords: {Fabrication;Hash functions;Public key;Network security;Virtual private networks;Encryption;Cryptography;Applied Cryptography;Network Security;RSA;Interception;Interruption;Modification;Fabrication},
A. Yeboah-Ofori, I. Darvishi and A. S. Opeyemi, "Enhancement of Big Data Security in Cloud Computing Using RSA Algorithm," 2023 10th International Conference on Future Internet of Things and Cloud (FiCloud), Marrakesh, Morocco, 2023, pp. 312-319, doi: 10.1109/FiCloud58648.2023.00053.
A. Yeboah-Ofori and A. Ganiyu, "Big Data Security Using RSA Algorithms in A VPN Domain," 2024 International Conference on Artificial Intelligence, Computer, Data Sciences and Applications (ACDSA), Victoria, Seychelles, 2024, pp. 1-6, doi: 10.1109/ACDSA59508.2024.10467364.
Borges, F., Reis, P.R. and Pereira, D., 2020. A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography. *IEEE Access*, 8, pp.142413-142422. https://doi.org/10.1109/ACCESS.2020.3013250.
Wang, X., Luo, T. and Li, J., 2018. A More Efficient Fully Homomorphic Encryption Scheme Based on GSW and DM Schemes. *Security and Communication Networks*, 2018, pp.1-14. https://doi.org/10.1155/2018/8706940.
Koseki, R., Ito, A., Ueno, R., Tibouchi, M. and Homma, N., 2022. Homomorphic encryption for stochastic computing. *Journal of Cryptographic Engineering*, 13(2), pp.251- 263. https://doi.org/10.1007/s13389-022-00299-6.
Verma, S. and Garg, D., 2011. Improvement in RSA cryptosystem. *Journal of Advances in Information Technology*, 2(3), pp.146-151
Shuhab, S., Farina, R., Rabia, R., Sanam, S.R., Shahab, A. and Abdulla, S.A., 2022. An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy. *Sensors*, 22(21), p.8151. https://doi.org/10.3390/s22218151.
Liu-Jun, Wang., You, Zhou., Jianfeng, Yin., Qing, Chen. (2022). Authentication of quantum key distribution with post-quantum cryptography and replay attacks. arXiv.org, Available from: 10.48550/arXiv.2206.01164
Doliskani, J., 2021. Efficient Quantum Public-Key Encryption From Learning With Errors. *arXiv: Quantum Physics*. Available at: https://doi.org/10.48550/arxiv.2103.13788.
Melis, P., Durak, K. and Tefek, U., 2022. Cryptographic security concerns on timestamp sharing via a public channel in quantum-key-distribution systems. *Physical Review A*, 106(1), p.012611. https://doi.org/10.1103/PhysRevA.106.012611
Pereira, M., Kato, G., Curty, M. and Tamaki, K., 2023. A security framework for quantum key distribution implementations. *Electronics*, 12(6), p.2643. https://doi.org/10.3390/electronics12122643
Randy, Kuang., Maria, Perepechaenko., Ryan, Toth., Michel, Barbeau. (2022). Benchmark Performance of a New Quantum-Safe Multivariate Polynomial Digital Signature Algorithm. Available from: 10.1109/QCE53715.2022.00067
Sergey, E., Yunakovsky., Maxim, Kot., N.O., Pozhar., Denis, Nabokov., Mikhail, A., Kudinov., Anton, Guglya., Evgeniy, O., Kiktenko., Ekaterina, Kolycheva., Alexander, Borisov., Aleksey, Fedorov. (2021). Towards security recommendations for public-key infrastructures for production environments in the post-quantum era. EPJ Quantum Technology, Available from: 10.1140/EPJQT/S40507-021-00104-Z
National Institute of Standards and Technology (NIST), 2022. NIST Announces First Four Quantum-Resistant Cryptographic Algorithms. [online] Available at: https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistantcryptographic algorithms [Accessed 4, May 2024]
Barker, E., Barker, W., Burr, W., Polk, W. & Smid, M., 2016. Recommendation for Key Management – Part 1: General (Revision 4). Gaithersburg, MD: National Institute of Standards and Technology.https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf.