<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:doc-W2SF25ZP</identifier><date>2025</date><creator>Ceronmani, Sharmila</creator><creator>Shaik, Mohammad Ilias</creator><creator>V., Sathya Durga</creator><relation>documents/doc/W/URN_NBN_SI_doc-W2SF25ZP_001.pdf</relation><relation>documents/doc/W/URN_NBN_SI_doc-W2SF25ZP_001.txt</relation><format format_type="issue">11</format><format format_type="volume">49</format><format format_type="type">article</format><format format_type="extent">str. 165-176</format><identifier identifier_type="DOI">10.31449/inf.v49i11.7384</identifier><identifier identifier_type="ISSN">1854-3871</identifier><identifier identifier_type="COBISSID">239933187</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-W2SF25ZP</identifier><language>eng</language><publisher publisher_location="Ljubljana">Informatika</publisher><source>Informatica (Ljubljana)</source><rights>BY</rights><subject language_type_id="slv">izmenjava ključev</subject><subject language_type_id="slv">post-kvantna kriptografija</subject><subject language_type_id="slv">računalništvo v oblaku</subject><subject language_type_id="slv">umetna inteligenca</subject><subject language_type_id="slv">varnost podatkov</subject><title>An integrated framework with enhanced primitives for post-quantum cryptography: HEDT and ECSIDH for cloud data security and key exchange</title></Record>