Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Conference Proceeding
|
Breaking Symmetric Cryptosystems Using Quantum Period FindingDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8Digital Resources/Online E-Resources |
|
2 |
Material Type: Book Chapter
|
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank ProblemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17Digital Resources/Online E-Resources |
|
3 |
Material Type: Article
|
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptographyLaser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258Digital Resources/Online E-Resources |
|
4 |
Material Type: Conference Proceeding
|
An Algebraic Attack on Rank Metric Code-Based CryptosystemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-45727-3_3Digital Resources/Online E-Resources |
|
5 |
Material Type: Article
|
Advances and Open Problems in Federated LearningFoundations and trends in machine learning, 2021-01, Vol.14 (1-2), p.1-210 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1935-8237 ;EISSN: 1935-8245 ;DOI: 10.1561/2200000083Digital Resources/Online E-Resources |
|
6 |
Material Type: Article
|
Internet of things security: A top-down surveyComputer networks (Amsterdam, Netherlands : 1999), 2018-08, Vol.141, p.199-221 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1389-1286 ;EISSN: 1872-7069 ;DOI: 10.1016/j.comnet.2018.03.012Digital Resources/Online E-Resources |
|
7 |
Material Type: Article
|
Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache ProcessingIEEE MICRO, 2024-01, Vol.44 (1), p.59-68 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0272-1732 ;EISSN: 1937-4143 ;DOI: 10.1109/MM.2023.3304425Digital Resources/Online E-Resources |
|
8 |
Material Type: Article
|
Preserving privacy in speaker and speech characterisationComputer speech & language, 2019-11, Vol.58, p.441-480 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0885-2308 ;EISSN: 1095-8363 ;DOI: 10.1016/j.csl.2019.06.001Digital Resources/Online E-Resources |
|
9 |
Material Type: Article
|
Physical ZKP protocols for Nurimisaki and KurodokoTheoretical computer science, 2023-09, Vol.972 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2023.114071Digital Resources/Online E-Resources |
|
10 |
Material Type: Article
|
How to construct physical zero-knowledge proofs for puzzles with a “single loop” conditionTheoretical computer science, 2021-10, Vol.888, p.41-55 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2021.07.019Digital Resources/Online E-Resources |
|
11 |
Material Type: Book Chapter
|
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experimentAnnual International Cryptology Conference, 2020, Vol.12171, p.62-91 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-56880-1_3Digital Resources/Online E-Resources |
|
12 |
Material Type: Article
|
A classification of ECM-friendly families using modular curvesMathematics of computation, 2022 (91), p.1405-1436 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0025-5718 ;EISSN: 1088-6842 ;DOI: 10.1090/mcom/3697Digital Resources/Online E-Resources |
|
13 |
Material Type: Article
|
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation StrategiesInternational journal of information security, 2024, Vol.15 (2), p.148-167 [Peer Reviewed Journal]Attribution ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.4236/jis.2024.152010Digital Resources/Online E-Resources |
|
14 |
Material Type: Article
|
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based TransportationIEEE transactions on intelligent transportation systems, 2019-12, Vol.20 (12), p.4405-4414 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1524-9050 ;EISSN: 1558-0016 ;DOI: 10.1109/TITS.2018.2885054Digital Resources/Online E-Resources |
|
15 |
Material Type: Article
|
Post-Quantum and Code-Based Cryptography—Some Prospective Research DirectionsCryptography, 2021-12, Vol.5 (4), p.38 [Peer Reviewed Journal]2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 2410-387X ;EISSN: 2410-387X ;DOI: 10.3390/cryptography5040038Full text available |
|
16 |
Material Type: Article
|
DAGS: Key encapsulation using dyadic GS codesJournal of mathematical cryptology, 2018-12, Vol.12 (4), p.221-239 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1862-2976 ;EISSN: 1862-2984 ;DOI: 10.1515/jmc-2018-0027Full text available |
|
17 |
Material Type: Article
|
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiencyTheoretical computer science, 2022-05, Vol.914, p.84-113 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2022.02.014Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
Cryptanalysis of a code-based one-time signatureDesigns, codes, and cryptography, 2020-09 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-020-00737-8Digital Resources/Online E-Resources |
|
19 |
Material Type: Article
|
Hardware Private Circuits: From Trivial Composition to Full VerificationIEEE transactions on computers, 2021-10 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0018-9340 ;EISSN: 1557-9956 ;DOI: 10.1109/tc.2020.3022979Digital Resources/Online E-Resources |
|
20 |
Material Type: Article
|
ZKP protocols for Usowan, Herugolf and Five CellsTsinghua science and technology, 2023 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1007-0214 ;EISSN: 1878-7606 ;DOI: 10.26599/TST.20xx.9010Digital Resources/Online E-Resources |