Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Conference Proceeding
|
Breaking Symmetric Cryptosystems Using Quantum Period FindingAdvances in Cryptology – CRYPTO 2016, 2016, Vol.9815, p.207-237 [Peer Reviewed Journal]International Association for Cryptologic Research 2016 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0302-9743 ;ISBN: 9783662530078 ;ISBN: 3662530074 ;EISSN: 1611-3349 ;EISBN: 9783662530085 ;EISBN: 3662530082 ;DOI: 10.1007/978-3-662-53008-5_8Digital Resources/Online E-Resources |
|
2 |
Material Type: Conference Proceeding
|
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2810103.2813707Digital Resources/Online E-Resources |
|
3 |
Material Type: Book Chapter
|
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank ProblemsAdvances in Cryptology – ASIACRYPT 2020, 2020, Vol.12491, p.507-536 [Peer Reviewed Journal]International Association for Cryptologic Research 2020 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0302-9743 ;ISBN: 3030648362 ;ISBN: 9783030648367 ;EISSN: 1611-3349 ;EISBN: 9783030648374 ;EISBN: 3030648370 ;DOI: 10.1007/978-3-030-64837-4_17Digital Resources/Online E-Resources |
|
4 |
Material Type: Article
|
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptographyLaser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258Digital Resources/Online E-Resources |
|
5 |
Material Type: Conference Proceeding
|
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPNDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2976749.2978423Digital Resources/Online E-Resources |
|
6 |
Material Type: Conference Proceeding
|
An Algebraic Attack on Rank Metric Code-Based CryptosystemsAdvances in Cryptology – EUROCRYPT 2020, Vol.12107, p.64-93 [Peer Reviewed Journal]International Association for Cryptologic Research 2020 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0302-9743 ;ISBN: 9783030457266 ;ISBN: 3030457265 ;EISSN: 1611-3349 ;EISBN: 9783030457273 ;EISBN: 3030457273 ;DOI: 10.1007/978-3-030-45727-3_3Digital Resources/Online E-Resources |
|
7 |
Material Type: Article
|
Advances and Open Problems in Federated LearningFoundations and trends in machine learning, 2021-01, Vol.14 (1-2), p.1-210 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1935-8237 ;EISSN: 1935-8245 ;DOI: 10.1561/2200000083Digital Resources/Online E-Resources |
|
8 |
Material Type: Article
|
Internet of things security: A top-down surveyComputer networks (Amsterdam, Netherlands : 1999), 2018-08, Vol.141, p.199-221 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1389-1286 ;EISSN: 1872-7069 ;DOI: 10.1016/j.comnet.2018.03.012Digital Resources/Online E-Resources |
|
9 |
Material Type: Article
|
Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache ProcessingIEEE MICRO, 2024-01, Vol.44 (1), p.59-68 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0272-1732 ;EISSN: 1937-4143 ;DOI: 10.1109/MM.2023.3304425Digital Resources/Online E-Resources |
|
10 |
Material Type: Article
|
Preserving privacy in speaker and speech characterisationComputer speech & language, 2019-11, Vol.58, p.441-480 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0885-2308 ;EISSN: 1095-8363 ;DOI: 10.1016/j.csl.2019.06.001Digital Resources/Online E-Resources |
|
11 |
Material Type: Conference Proceeding
|
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in MicrocontrollersCCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, p.1857-1874Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/3133956.3134028Digital Resources/Online E-Resources |
|
12 |
Material Type: Article
|
Physical ZKP protocols for Nurimisaki and KurodokoTheoretical computer science, 2023-09, Vol.972 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2023.114071Digital Resources/Online E-Resources |
|
13 |
Material Type: Article
|
How to construct physical zero-knowledge proofs for puzzles with a “single loop” conditionTheoretical computer science, 2021-10, Vol.888, p.41-55 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2021.07.019Digital Resources/Online E-Resources |
|
14 |
Material Type: Conference Proceeding
|
Sharp: Short Relaxed Range ProofsAttribution ;ISBN: 1450394507 ;ISBN: 9781450394505 ;DOI: 10.1145/3548606.3560628Digital Resources/Online E-Resources |
|
15 |
Material Type: Book Chapter
|
Comparing the Difficulty of Factorization and Discrete Logarithm: A 240-Digit ExperimentAdvances in Cryptology – CRYPTO 2020, 2020, Vol.12171, p.62-91 [Peer Reviewed Journal]International Association for Cryptologic Research 2020 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0302-9743 ;ISBN: 3030568792 ;ISBN: 9783030568795 ;EISSN: 1611-3349 ;EISBN: 3030568806 ;EISBN: 9783030568801 ;DOI: 10.1007/978-3-030-56880-1_3Digital Resources/Online E-Resources |
|
16 |
Material Type: Article
|
A classification of ECM-friendly families using modular curvesMathematics of computation, 2022 (91), p.1405-1436 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0025-5718 ;EISSN: 1088-6842 ;DOI: 10.1090/mcom/3697Digital Resources/Online E-Resources |
|
17 |
Material Type: Article
|
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation StrategiesInternational journal of information security, 2024, Vol.15 (2), p.148-167 [Peer Reviewed Journal]Attribution ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.4236/jis.2024.152010Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based TransportationIEEE transactions on intelligent transportation systems, 2019-12, Vol.20 (12), p.4405-4414 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1524-9050 ;EISSN: 1558-0016 ;DOI: 10.1109/TITS.2018.2885054Digital Resources/Online E-Resources |
|
19 |
Material Type: Article
|
Post-Quantum and Code-Based Cryptography—Some Prospective Research DirectionsCryptography, 2021-12, Vol.5 (4), p.38 [Peer Reviewed Journal]2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 2410-387X ;EISSN: 2410-387X ;DOI: 10.3390/cryptography5040038Full text available |
|
20 |
Material Type: Article
|
DAGS: Key encapsulation using dyadic GS codesJournal of mathematical cryptology, 2018-12, Vol.12 (4), p.221-239 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1862-2976 ;EISSN: 1862-2984 ;DOI: 10.1515/jmc-2018-0027Full text available |