skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 6,691  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems
Material Type:
Conference Proceeding
Add to My Research

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17

Digital Resources/Online E-Resources

2
Breaking Symmetric Cryptosystems Using Quantum Period Finding
Material Type:
Conference Proceeding
Add to My Research

Breaking Symmetric Cryptosystems Using Quantum Period Finding

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8

Digital Resources/Online E-Resources

3
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
Material Type:
Conference Proceeding
Add to My Research

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2810103.2813707

Digital Resources/Online E-Resources

4
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography
Material Type:
Article
Add to My Research

Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography

Laser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258

Digital Resources/Online E-Resources

5
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
Material Type:
Conference Proceeding
Add to My Research

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2976749.2978423

Digital Resources/Online E-Resources

6
Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment
Material Type:
Conference Proceeding
Add to My Research

Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment

Annual International Cryptology Conference, 2020, Vol.12171, p.62-91 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-56880-1_3

Digital Resources/Online E-Resources

7
An Algebraic Attack on Rank Metric Code-Based Cryptosystems
Material Type:
Conference Proceeding
Add to My Research

An Algebraic Attack on Rank Metric Code-Based Cryptosystems

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-45727-3_3

Digital Resources/Online E-Resources

8
Advances and Open Problems in Federated Learning
Material Type:
Article
Add to My Research

Advances and Open Problems in Federated Learning

Foundations and trends in machine learning, 2021-01, Vol.14 (1-2), p.1-210 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1935-8237 ;EISSN: 1935-8245 ;DOI: 10.1561/2200000083

Digital Resources/Online E-Resources

9
Internet of things security: A top-down survey
Material Type:
Article
Add to My Research

Internet of things security: A top-down survey

Computer networks (Amsterdam, Netherlands : 1999), 2018-08, Vol.141, p.199-221 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1389-1286 ;EISSN: 1872-7069 ;DOI: 10.1016/j.comnet.2018.03.012

Digital Resources/Online E-Resources

10
Towards practical key exchange from ordinary isogeny graphs
Material Type:
Conference Proceeding
Add to My Research

Towards practical key exchange from ordinary isogeny graphs

Lecture Notes in Computer Science, Vol.11274 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-03332-3_14

Digital Resources/Online E-Resources

11
Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache Processing
Material Type:
Article
Add to My Research

Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache Processing

IEEE MICRO, 2024-01, Vol.44 (1), p.59-68 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0272-1732 ;EISSN: 1937-4143 ;DOI: 10.1109/MM.2023.3304425

Digital Resources/Online E-Resources

12
Preserving privacy in speaker and speech characterisation
Material Type:
Article
Add to My Research

Preserving privacy in speaker and speech characterisation

Computer speech & language, 2019-11, Vol.58, p.441-480 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0885-2308 ;EISSN: 1095-8363 ;DOI: 10.1016/j.csl.2019.06.001

Digital Resources/Online E-Resources

13
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers
Material Type:
Conference Proceeding
Add to My Research

Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers

CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, p.1857-1874

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/3133956.3134028

Digital Resources/Online E-Resources

14
Physical ZKP protocols for Nurimisaki and Kurodoko
Material Type:
Article
Add to My Research

Physical ZKP protocols for Nurimisaki and Kurodoko

Theoretical computer science, 2023-09, Vol.972 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2023.114071

Digital Resources/Online E-Resources

15
How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition
Material Type:
Article
Add to My Research

How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition

Theoretical computer science, 2021-10, Vol.888, p.41-55 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2021.07.019

Digital Resources/Online E-Resources

16
Sharp: Short Relaxed Range Proofs
Material Type:
Conference Proceeding
Add to My Research

Sharp: Short Relaxed Range Proofs

Attribution ;ISBN: 1450394507 ;ISBN: 9781450394505 ;DOI: 10.1145/3548606.3560628

Digital Resources/Online E-Resources

17
A classification of ECM-friendly families using modular curves
Material Type:
Article
Add to My Research

A classification of ECM-friendly families using modular curves

Mathematics of computation, 2022 (91), p.1405-1436 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0025-5718 ;EISSN: 1088-6842 ;DOI: 10.1090/mcom/3697

Digital Resources/Online E-Resources

18
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Material Type:
Article
Add to My Research

Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

International journal of information security, 2024, Vol.15 (2), p.148-167 [Peer Reviewed Journal]

Attribution ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.4236/jis.2024.152010

Digital Resources/Online E-Resources

19
Shorter Ring Signatures from Standard Assumptions
Material Type:
Conference Proceeding
Add to My Research

Shorter Ring Signatures from Standard Assumptions

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-17253-4_4

Digital Resources/Online E-Resources

20
Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols
Material Type:
Article
Add to My Research

Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols

IEEE access, 2024-04, p.1-1 [Peer Reviewed Journal]

Attribution ;ISSN: 2169-3536 ;EISSN: 2169-3536 ;DOI: 10.1109/ACCESS.2017

Full text available

Results 1 - 20 of 6,691  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (1,881)

Refine My Results

Creation Date 

From To
  1. Before 1998  (7)
  2. 1998 To 2003  (41)
  3. 2004 To 2009  (443)
  4. 2010 To 2016  (1,959)
  5. After 2016  (3,016)
  6. More options open sub menu

Language 

  1. English  (6,027)
  2. French  (660)
  3. Japanese  (162)
  4. Spanish  (4)
  5. Portuguese  (3)
  6. Ndongo  (2)
  7. Hungarian  (1)
  8. Italian  (1)
  9. German  (1)
  10. Chinese  (1)
  11. More options open sub menu

Searching Remote Databases, Please Wait