Concepedia

Publication | Closed Access

Post-quantum cryptography and 5G security

33

Citations

4

References

2019

Year

Abstract

The Fifth Generation (5G) mobile broadband standards make a fundamental shift in cryptography. Prior generations based their security and privacy principally on symmetric key cryptography. The Subscriber Identity Module (SIM) and its successors contain a shared key used to authenticate the User Equipment (UE) to the network, and vice versa.

References

YearCitations

Page 1