skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 1,878  for All Library Resources

Results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Breaking Symmetric Cryptosystems Using Quantum Period Finding
Material Type:
Conference Proceeding
Add to My Research

Breaking Symmetric Cryptosystems Using Quantum Period Finding

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8

Digital Resources/Online E-Resources

2
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems
Material Type:
Book Chapter
Add to My Research

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17

Digital Resources/Online E-Resources

3
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography
Material Type:
Article
Add to My Research

Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography

Laser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258

Digital Resources/Online E-Resources

4
An Algebraic Attack on Rank Metric Code-Based Cryptosystems
Material Type:
Conference Proceeding
Add to My Research

An Algebraic Attack on Rank Metric Code-Based Cryptosystems

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-45727-3_3

Digital Resources/Online E-Resources

5
Advances and Open Problems in Federated Learning
Material Type:
Article
Add to My Research

Advances and Open Problems in Federated Learning

Foundations and trends in machine learning, 2021-01, Vol.14 (1-2), p.1-210 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1935-8237 ;EISSN: 1935-8245 ;DOI: 10.1561/2200000083

Digital Resources/Online E-Resources

6
Internet of things security: A top-down survey
Material Type:
Article
Add to My Research

Internet of things security: A top-down survey

Computer networks (Amsterdam, Netherlands : 1999), 2018-08, Vol.141, p.199-221 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1389-1286 ;EISSN: 1872-7069 ;DOI: 10.1016/j.comnet.2018.03.012

Digital Resources/Online E-Resources

7
Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache Processing
Material Type:
Article
Add to My Research

Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache Processing

IEEE MICRO, 2024-01, Vol.44 (1), p.59-68 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0272-1732 ;EISSN: 1937-4143 ;DOI: 10.1109/MM.2023.3304425

Digital Resources/Online E-Resources

8
Preserving privacy in speaker and speech characterisation
Material Type:
Article
Add to My Research

Preserving privacy in speaker and speech characterisation

Computer speech & language, 2019-11, Vol.58, p.441-480 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0885-2308 ;EISSN: 1095-8363 ;DOI: 10.1016/j.csl.2019.06.001

Digital Resources/Online E-Resources

9
Physical ZKP protocols for Nurimisaki and Kurodoko
Material Type:
Article
Add to My Research

Physical ZKP protocols for Nurimisaki and Kurodoko

Theoretical computer science, 2023-09, Vol.972 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2023.114071

Digital Resources/Online E-Resources

10
How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition
Material Type:
Article
Add to My Research

How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition

Theoretical computer science, 2021-10, Vol.888, p.41-55 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2021.07.019

Digital Resources/Online E-Resources

11
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
Material Type:
Book Chapter
Add to My Research

Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment

Annual International Cryptology Conference, 2020, Vol.12171, p.62-91 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-56880-1_3

Digital Resources/Online E-Resources

12
A classification of ECM-friendly families using modular curves
Material Type:
Article
Add to My Research

A classification of ECM-friendly families using modular curves

Mathematics of computation, 2022 (91), p.1405-1436 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0025-5718 ;EISSN: 1088-6842 ;DOI: 10.1090/mcom/3697

Digital Resources/Online E-Resources

13
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Material Type:
Article
Add to My Research

Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

International journal of information security, 2024, Vol.15 (2), p.148-167 [Peer Reviewed Journal]

Attribution ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.4236/jis.2024.152010

Digital Resources/Online E-Resources

14
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation
Material Type:
Article
Add to My Research

A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation

IEEE transactions on intelligent transportation systems, 2019-12, Vol.20 (12), p.4405-4414 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1524-9050 ;EISSN: 1558-0016 ;DOI: 10.1109/TITS.2018.2885054

Digital Resources/Online E-Resources

15
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
Material Type:
Article
Add to My Research

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

Cryptography, 2021-12, Vol.5 (4), p.38 [Peer Reviewed Journal]

2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 2410-387X ;EISSN: 2410-387X ;DOI: 10.3390/cryptography5040038

Full text available

16
DAGS: Key encapsulation using dyadic GS codes
Material Type:
Article
Add to My Research

DAGS: Key encapsulation using dyadic GS codes

Journal of mathematical cryptology, 2018-12, Vol.12 (4), p.221-239 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1862-2976 ;EISSN: 1862-2984 ;DOI: 10.1515/jmc-2018-0027

Full text available

17
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency
Material Type:
Article
Add to My Research

A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency

Theoretical computer science, 2022-05, Vol.914, p.84-113 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2022.02.014

Digital Resources/Online E-Resources

18
Cryptanalysis of a code-based one-time signature
Material Type:
Article
Add to My Research

Cryptanalysis of a code-based one-time signature

Designs, codes, and cryptography, 2020-09 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-020-00737-8

Digital Resources/Online E-Resources

19
Hardware Private Circuits: From Trivial Composition to Full Verification
Material Type:
Article
Add to My Research

Hardware Private Circuits: From Trivial Composition to Full Verification

IEEE transactions on computers, 2021-10 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0018-9340 ;EISSN: 1557-9956 ;DOI: 10.1109/tc.2020.3022979

Digital Resources/Online E-Resources

20
ZKP protocols for Usowan, Herugolf and Five Cells
Material Type:
Article
Add to My Research

ZKP protocols for Usowan, Herugolf and Five Cells

Tsinghua science and technology, 2023 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1007-0214 ;EISSN: 1878-7606 ;DOI: 10.26599/TST.20xx.9010

Digital Resources/Online E-Resources

Results 1 - 20 of 1,878  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Refine My Results

Creation Date 

From To
  1. Before 1999  (6)
  2. 1999 To 2004  (26)
  3. 2005 To 2010  (157)
  4. 2011 To 2017  (690)
  5. After 2017  (1,031)
  6. More options open sub menu

Language 

  1. English  (1,866)
  2. Japanese  (138)
  3. French  (13)
  4. Italian  (1)
  5. Chinese  (1)
  6. More options open sub menu

Searching Remote Databases, Please Wait