Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Conference Proceeding
|
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank ProblemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17Digital Resources/Online E-Resources |
|
2 |
Material Type: Conference Proceeding
|
Breaking Symmetric Cryptosystems Using Quantum Period FindingDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8Digital Resources/Online E-Resources |
|
3 |
Material Type: Conference Proceeding
|
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2810103.2813707Digital Resources/Online E-Resources |
|
4 |
Material Type: Article
|
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptographyLaser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258Digital Resources/Online E-Resources |
|
5 |
Material Type: Conference Proceeding
|
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPNDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2976749.2978423Digital Resources/Online E-Resources |
|
6 |
Material Type: Conference Proceeding
|
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experimentAnnual International Cryptology Conference, 2020, Vol.12171, p.62-91 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-56880-1_3Digital Resources/Online E-Resources |
|
7 |
Material Type: Conference Proceeding
|
An Algebraic Attack on Rank Metric Code-Based CryptosystemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-45727-3_3Digital Resources/Online E-Resources |
|
8 |
Material Type: Article
|
Advances and Open Problems in Federated LearningFoundations and trends in machine learning, 2021-01, Vol.14 (1-2), p.1-210 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1935-8237 ;EISSN: 1935-8245 ;DOI: 10.1561/2200000083Digital Resources/Online E-Resources |
|
9 |
Material Type: Article
|
Internet of things security: A top-down surveyComputer networks (Amsterdam, Netherlands : 1999), 2018-08, Vol.141, p.199-221 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1389-1286 ;EISSN: 1872-7069 ;DOI: 10.1016/j.comnet.2018.03.012Digital Resources/Online E-Resources |
|
10 |
Material Type: Conference Proceeding
|
Towards practical key exchange from ordinary isogeny graphsLecture Notes in Computer Science, Vol.11274 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-03332-3_14Digital Resources/Online E-Resources |
|
11 |
Material Type: Article
|
Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache ProcessingIEEE MICRO, 2024-01, Vol.44 (1), p.59-68 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0272-1732 ;EISSN: 1937-4143 ;DOI: 10.1109/MM.2023.3304425Digital Resources/Online E-Resources |
|
12 |
Material Type: Article
|
Preserving privacy in speaker and speech characterisationComputer speech & language, 2019-11, Vol.58, p.441-480 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0885-2308 ;EISSN: 1095-8363 ;DOI: 10.1016/j.csl.2019.06.001Digital Resources/Online E-Resources |
|
13 |
Material Type: Conference Proceeding
|
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in MicrocontrollersCCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, p.1857-1874Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/3133956.3134028Digital Resources/Online E-Resources |
|
14 |
Material Type: Article
|
Physical ZKP protocols for Nurimisaki and KurodokoTheoretical computer science, 2023-09, Vol.972 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2023.114071Digital Resources/Online E-Resources |
|
15 |
Material Type: Article
|
How to construct physical zero-knowledge proofs for puzzles with a “single loop” conditionTheoretical computer science, 2021-10, Vol.888, p.41-55 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2021.07.019Digital Resources/Online E-Resources |
|
16 |
Material Type: Conference Proceeding
|
Sharp: Short Relaxed Range ProofsAttribution ;ISBN: 1450394507 ;ISBN: 9781450394505 ;DOI: 10.1145/3548606.3560628Digital Resources/Online E-Resources |
|
17 |
Material Type: Article
|
A classification of ECM-friendly families using modular curvesMathematics of computation, 2022 (91), p.1405-1436 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0025-5718 ;EISSN: 1088-6842 ;DOI: 10.1090/mcom/3697Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation StrategiesInternational journal of information security, 2024, Vol.15 (2), p.148-167 [Peer Reviewed Journal]Attribution ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.4236/jis.2024.152010Digital Resources/Online E-Resources |
|
19 |
Material Type: Conference Proceeding
|
Shorter Ring Signatures from Standard AssumptionsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-17253-4_4Digital Resources/Online E-Resources |
|
20 |
Material Type: Article
|
Secure Communication for the IoT: EDHOC and (Group) OSCORE ProtocolsIEEE access, 2024-04, p.1-1 [Peer Reviewed Journal]Attribution ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2017Full text available |