Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposalsIET information security, 2023-03, Vol.17 (2), p.159-160 [Peer Reviewed Journal]2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/ise2.12105Full text available |
|
2 |
Material Type: Article
|
Cryptanalysis Attacks for Factoring Generalized Takagi's Scheme N = prqsNew trends in mathematical sciences, 2022-06, Vol.10 (1), p.54-662022. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2147-5520 ;DOI: 10.20852/ntmsci.2022.464Full text available |
|
3 |
Material Type: Article
|
A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n ZJournal of physics. Conference series, 2019-03, Vol.1176 (4), p.42019 [Peer Reviewed Journal]2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1176/4/042019Full text available |
|
4 |
Material Type: Article
|
Quantum secret kept for a dayNature (London), 2016-10, Vol.538 (7624), p.142-142 [Peer Reviewed Journal]Copyright Nature Publishing Group Oct 13, 2016 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/538142c ;CODEN: NATUASFull text available |
|
5 |
Material Type: Article
|
CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTSBulletin of "Carol I" National Defense University, 2018-01, Vol.7 (1), p.48 [Peer Reviewed Journal]2018. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2284-936X ;EISSN: 2284-9378Full text available |
|
6 |
Material Type: Article
|
Retracted: Power IoT System Architecture Integrating Trusted Computing and BlockchainWireless communications and mobile computing, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Wireless Communications and Mobile Computing. ;Copyright © 2023 Wireless Communications and Mobile Computing. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1530-8669 ;EISSN: 1530-8677 ;DOI: 10.1155/2023/9851453Full text available |
|
7 |
Material Type: Conference Proceeding
|
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank ProblemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17Digital Resources/Online E-Resources |
|
8 |
Material Type: Article
|
Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based CryptographyBeijing da xue xue bao, 2021-01, Vol.57 (4), p.595-604Copyright Acta Scientiarum Naturalium Universitatis Pekinenis 2021 ;ISSN: 0479-8023 ;DOI: 10.13209/j.0479-8023.2021.054Full text available |
|
9 |
Material Type: Article
|
The Impact of Quantum Computing on Present CryptographyInternational journal of advanced computer science & applications, 2018, Vol.9 (3)2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;info:eu-repo/semantics/openAccess ;ISSN: 2158-107X ;EISSN: 2156-5570 ;DOI: 10.14569/IJACSA.2018.090354Full text available |
|
10 |
Material Type: Article
|
Retracted: Digital Identity Verification and Management System of Blockchain-Based Verifiable Certificate with the Privacy Protection of Identity and BehaviorSecurity and communication networks, 2024-01, Vol.2024, p.1-1 [Peer Reviewed Journal]Copyright © 2024 Security and Communication Networks. ;Copyright © 2024 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2024/9854035Full text available |
|
11 |
Material Type: Article
|
Retracted: Blockchain-Based Intelligent Interconnection System Optimization DecisionSecurity and communication networks, 2024-01, Vol.2024, p.1-1 [Peer Reviewed Journal]Copyright © 2024 Security and Communication Networks. ;Copyright © 2024 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2024/9897279Full text available |
|
12 |
Material Type: Conference Proceeding
|
Breaking Symmetric Cryptosystems Using Quantum Period FindingDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8Digital Resources/Online E-Resources |
|
13 |
Material Type: Article
|
Retracted: Blockchain in Secure Healthcare Systems: State of the Art, Limitations, and Future DirectionsSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9827513Full text available |
|
14 |
Material Type: Article
|
Retracted: Secure Model for IoT Healthcare System under Encrypted Blockchain FrameworkSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9895719Full text available |
|
15 |
Material Type: Article
|
Retracted: Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart ContractSecurity and communication networks, 2023-10, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Security and Communication Networks. ;Copyright © 2023 Security and Communication Networks. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 ;ISSN: 1939-0114 ;EISSN: 1939-0122 ;DOI: 10.1155/2023/9853410Full text available |
|
16 |
Material Type: Article
|
Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messagesT.A.S.K. quarterly, 2024-01, Vol.26 (3)ISSN: 1428-6394 ;DOI: 10.34808/ksxc-hn17Full text available |
|
17 |
Material Type: Article
|
On LCD codes over Z 4Journal of physics. Conference series, 2021-05, Vol.1850 (1), p.12021 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1850/1/012021Full text available |
|
18 |
Material Type: Article
|
A complete one-way function based on a finite rank free Z x Z-moduleJournal of mathematical sciences (New York, N.Y.), 2013-07, Vol.192 (3), p.307 [Peer Reviewed Journal]COPYRIGHT 2013 Springer ;ISSN: 1072-3374 ;EISSN: 1573-8795Full text available |
|
19 |
Material Type: Conference Proceeding
|
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2810103.2813707Digital Resources/Online E-Resources |
|
20 |
Material Type: Article
|
Secure quantum key distributionNature photonics, 2014-08, Vol.8 (8), p.595-604 [Peer Reviewed Journal]Copyright Nature Publishing Group Aug 2014 ;ISSN: 1749-4885 ;EISSN: 1749-4893 ;DOI: 10.1038/nphoton.2014.149Full text available |