Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
21 |
Material Type: Article
|
Device-independent quantum key distribution with random key basisNature communications, 2021-05, Vol.12 (1), p.2880-2880, Article 2880 [Peer Reviewed Journal]The Author(s) 2021. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2021 ;ISSN: 2041-1723 ;EISSN: 2041-1723 ;DOI: 10.1038/s41467-021-23147-3 ;PMID: 34001885Full text available |
|
22 |
Material Type: Article
|
One giant step for quantum internet: Chinese satellite is first in a wave of planned craft that could form network secured by quantum cryptographyNature (London), 2016-07, Vol.535 (7613), p.478 [Peer Reviewed Journal]COPYRIGHT 2016 Nature Publishing Group ;COPYRIGHT 2016 Nature Publishing Group ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/535478aFull text available |
|
23 |
Material Type: Article
|
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptographyLaser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258Digital Resources/Online E-Resources |
|
24 |
Material Type: Article
|
Asymmetric cryptosystem based on optical scanning cryptography and elliptic curve algorithmScientific reports, 2022-05, Vol.12 (1), p.7722-7722, Article 7722 [Peer Reviewed Journal]2022. The Author(s). ;The Author(s) 2022. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;The Author(s) 2022 ;ISSN: 2045-2322 ;EISSN: 2045-2322 ;DOI: 10.1038/s41598-022-11861-x ;PMID: 35545658Full text available |
|
25 |
Material Type: Article
|
Ascon v1.2: Lightweight Authenticated Encryption and HashingJournal of cryptology, 2021-07, Vol.34 (3) [Peer Reviewed Journal]The Author(s) 2021 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09398-9Digital Resources/Online E-Resources |
|
26 |
Material Type: Article
|
Quantum-Safe Group Key Establishment Protocol from Lattice TrapdoorsSensors (Basel, Switzerland), 2022-05, Vol.22 (11), p.4148 [Peer Reviewed Journal]2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;2022 by the authors. 2022 ;ISSN: 1424-8220 ;EISSN: 1424-8220 ;DOI: 10.3390/s22114148 ;PMID: 35684771Full text available |
|
27 |
Material Type: Article
|
Composable security in relativistic quantum cryptographyNew journal of physics, 2019-04, Vol.21 (4), p.43057 [Peer Reviewed Journal]2019 The Author(s). Published by IOP Publishing Ltd on behalf of the Institute of Physics and Deutsche Physikalische Gesellschaft ;2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1367-2630 ;EISSN: 1367-2630 ;DOI: 10.1088/1367-2630/ab0e3b ;CODEN: NJOPFMFull text available |
|
28 |
Material Type: Thesises (postgraduate)
|
Automated Design Space Exploration and Datapath Synthesis for Finite Field Arithmetic with Applications to Lightweight CryptographyDigital Resources/Online E-Resources |
|
29 |
Material Type: Conference Proceeding
|
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPNDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2976749.2978423Digital Resources/Online E-Resources |
|
30 |
Material Type: Conference Proceeding
|
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experimentAnnual International Cryptology Conference, 2020, Vol.12171, p.62-91 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-56880-1_3Digital Resources/Online E-Resources |
|
31 |
Material Type: Article
|
Post‐quantum identity‐based authenticated multiple key agreement protocolETRI Journal, 2023, 45(6), , pp.1090-1102 [Peer Reviewed Journal]1225‐6463/$ © 2023 ETRI ;ISSN: 1225-6463 ;EISSN: 2233-7326 ;DOI: 10.4218/etrij.2022-0320Full text available |
|
32 |
Material Type: Article
|
The Application of Blockchain and its Advantage to the Field of ArtJournal of physics. Conference series, 2020-01, Vol.1437 (1), p.12063 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1437/1/012063Full text available |
|
33 |
Material Type: Article
|
Impact three pass protocol modifications to key transmission performanceJournal of physics. Conference series, 2019-06, Vol.1235 (1), p.12050 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1235/1/012050Full text available |
|
34 |
Material Type: Book
|
The Cryptographic Imagination: Secret Writing from Edgar Poe to the InternetISBN: 1421437171 ;ISBN: 9781421437170 ;EISBN: 9781421437163 ;EISBN: 1421437163 ;DOI: 10.1353/book.72709Full text available |
|
35 |
Material Type: Conference Proceeding
|
An Algebraic Attack on Rank Metric Code-Based CryptosystemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-45727-3_3Digital Resources/Online E-Resources |
|
36 |
Material Type: Article
|
Identity-Based Redactable Lamport Signature SchemeJournal of physics. Conference series, 2019-10, Vol.1314 (1), p.12147 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1314/1/012147Full text available |
|
37 |
Material Type: Article
|
Post-quantum cryptographyNature (London), 2017-09, Vol.549 (7671), p.188-194 [Peer Reviewed Journal]COPYRIGHT 2017 Nature Publishing Group ;COPYRIGHT 2017 Nature Publishing Group ;Copyright Nature Publishing Group Sep 14, 2017 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/nature23461 ;PMID: 28905891Full text available |
|
38 |
Material Type: Article
|
Experimental quantum key distribution certified by Bell's theoremNature (London), 2022-07, Vol.607 (7920), p.682-686 [Peer Reviewed Journal]2022. The Author(s), under exclusive licence to Springer Nature Limited. ;Copyright Nature Publishing Group Jul 28, 2022 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/s41586-022-04941-5 ;PMID: 35896644Full text available |
|
39 |
Material Type: Book
|
Introduction to CryptologyISBN: 0898382718 ;ISBN: 9780898382716 ;EISBN: 9781461316930 ;EISBN: 1461316936Full text available |
|
40 |
Material Type: Article
|
Verification of Quantum Computation: An Overview of Existing ApproachesTheory of computing systems, 2019-05, Vol.63 (4), p.715-808 [Peer Reviewed Journal]The Author(s) 2018 ;Theory of Computing Systems is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1432-4350 ;EISSN: 1433-0490 ;DOI: 10.1007/s00224-018-9872-3Full text available |