Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
From the archiveNature (London), 2023-06, Vol.618 (7963), p.37-37 [Peer Reviewed Journal]Copyright Nature Publishing Group Jun 1, 2023 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/d41586-023-01742-2Full text available |
|
2 |
Material Type: Article
|
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposalsIET information security, 2023-03, Vol.17 (2), p.159-160 [Peer Reviewed Journal]2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/ise2.12105Full text available |
|
3 |
Material Type: Article
|
A Solution to Defend Cloud Auditing Protocols from A Potential AttackJournal of physics. Conference series, 2020-01, Vol.1437 (1), p.12112 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1437/1/012112Full text available |
|
4 |
Material Type: Article
|
Cryptanalysis Attacks for Factoring Generalized Takagi's Scheme N = prqsNew trends in mathematical sciences, 2022-06, Vol.10 (1), p.54-662022. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2147-5520 ;DOI: 10.20852/ntmsci.2022.464Full text available |
|
5 |
Material Type: Article
|
A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n ZJournal of physics. Conference series, 2019-03, Vol.1176 (4), p.42019 [Peer Reviewed Journal]2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1176/4/042019Full text available |
|
6 |
Material Type: Article
|
Quantum secret kept for a dayNature (London), 2016-10, Vol.538 (7624), p.142-142 [Peer Reviewed Journal]Copyright Nature Publishing Group Oct 13, 2016 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/538142c ;CODEN: NATUASFull text available |
|
7 |
Material Type: Article
|
CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTSBulletin of "Carol I" National Defense University, 2018-01, Vol.7 (1), p.48 [Peer Reviewed Journal]2018. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2284-936X ;EISSN: 2284-9378Full text available |
|
8 |
Material Type: Article
|
Retracted: Power IoT System Architecture Integrating Trusted Computing and BlockchainWireless communications and mobile computing, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Wireless Communications and Mobile Computing. ;Copyright © 2023 Wireless Communications and Mobile Computing. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1530-8669 ;EISSN: 1530-8677 ;DOI: 10.1155/2023/9851453Full text available |
|
9 |
Material Type: Article
|
Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based CryptographyBeijing da xue xue bao, 2021-01, Vol.57 (4), p.595-604Copyright Acta Scientiarum Naturalium Universitatis Pekinenis 2021 ;ISSN: 0479-8023 ;DOI: 10.13209/j.0479-8023.2021.054Full text available |
|
10 |
Material Type: Article
|
Publisher's Note: “Demonstration of a 6 state-4 state reference frame independent channel for quantum key distribution” [Appl. Phys. Lett. 115, 211103 (2019)]Applied physics letters, 2019-12, Vol.115 (23) [Peer Reviewed Journal]Author(s) ;2019 Author(s). Published under license by AIP Publishing. ;ISSN: 0003-6951 ;EISSN: 1077-3118 ;DOI: 10.1063/1.5139502 ;CODEN: APPLABFull text available |
|
11 |
Material Type: Article
|
Rodríguez Narváez, Roberto Sergio: "Criptografía diplomática, política y militar en México, 1813-1926", Ciudad de México, Secretaría de Relaciones Exteriores, Dirección General del Acervo Histórico Diplomático, 2019, 495 pp. ISBN: 978-607-446-152-7Documenta & Instrumenta, 2021-04, Vol.19, p.281-2832021. This work is licensed under https://creativecommons.org/licenses/by/4.0/legalcode (the “License”). Notwithstanding the ProQuest Terms and conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1697-4328 ;EISSN: 1697-3798 ;DOI: 10.5209/docu.75482Full text available |
|
12 |
Material Type: Article
|
Retracted: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and BehaviorSecurity and communication networks, 2024-01, Vol.2024, p.1-1 [Peer Reviewed Journal]Copyright © 2024 Security and Communication Networks. ;Copyright © 2024 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2024/9854035Full text available |
|
13 |
Material Type: Article
|
Retracted: Blockchain-Based Intelligent Interconnection System Optimization DecisionSecurity and communication networks, 2024-01, Vol.2024, p.1-1 [Peer Reviewed Journal]Copyright © 2024 Security and Communication Networks. ;Copyright © 2024 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2024/9897279Full text available |
|
14 |
Material Type: Conference Proceeding
|
Breaking Symmetric Cryptosystems Using Quantum Period FindingDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8Digital Resources/Online E-Resources |
|
15 |
Material Type: Article
|
Retracted: Secure Model for IoT Healthcare System under Encrypted Blockchain FrameworkSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9895719Full text available |
|
16 |
Material Type: Article
|
Retracted: Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future DirectionsSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9827513Full text available |
|
17 |
Material Type: Article
|
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart ContractSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9853410Full text available |
|
18 |
Material Type: Article
|
Systematic and Critical Review of RSA Based Public Key Cryptographic Schemes: Past and Present StatusIEEE access, 2021, Vol.9, p.155949-155976 [Peer Reviewed Journal]Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2021.3129224 ;CODEN: IAECCGFull text available |
|
19 |
Material Type: Article
|
Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messagesT.A.S.K. quarterly, 2024-01, Vol.26 (3)ISSN: 1428-6394 ;DOI: 10.34808/ksxc-hn17Full text available |
|
20 |
Material Type: Article
|
Passive BB84 decoy-state protocol with a flawed sourceJournal of physics. Conference series, 2021-07, Vol.1984 (1), p.12002 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1984/1/012002Full text available |