skip to main content
Language:
Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Breaking Symmetric Cryptosystems Using Quantum Period Finding
Material Type:
Conference Proceeding
Add to My Research

Breaking Symmetric Cryptosystems Using Quantum Period Finding

Advances in Cryptology – CRYPTO 2016, 2016, Vol.9815, p.207-237 [Peer Reviewed Journal]

International Association for Cryptologic Research 2016 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0302-9743 ;ISBN: 9783662530078 ;ISBN: 3662530074 ;EISSN: 1611-3349 ;EISBN: 9783662530085 ;EISBN: 3662530082 ;DOI: 10.1007/978-3-662-53008-5_8

Digital Resources/Online E-Resources

2
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
Material Type:
Conference Proceeding
Add to My Research

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2810103.2813707

Digital Resources/Online E-Resources

3
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems
Material Type:
Book Chapter
Add to My Research

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems

Advances in Cryptology – ASIACRYPT 2020, 2020, Vol.12491, p.507-536 [Peer Reviewed Journal]

International Association for Cryptologic Research 2020 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0302-9743 ;ISBN: 3030648362 ;ISBN: 9783030648367 ;EISSN: 1611-3349 ;EISBN: 9783030648374 ;EISBN: 3030648370 ;DOI: 10.1007/978-3-030-64837-4_17

Digital Resources/Online E-Resources

4
Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography
Material Type:
Article
Add to My Research

Entanglement distribution over 150 km in wavelength division multiplexed channels for quantum cryptography

Laser & photonics reviews, 2016-05, Vol.10 (3) [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1863-8880 ;EISSN: 1863-8899 ;DOI: 10.1002/lpor.201500258

Digital Resources/Online E-Resources

5
On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN
Material Type:
Conference Proceeding
Add to My Research

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2976749.2978423

Digital Resources/Online E-Resources

6
An Algebraic Attack on Rank Metric Code-Based Cryptosystems
Material Type:
Conference Proceeding
Add to My Research

An Algebraic Attack on Rank Metric Code-Based Cryptosystems

Advances in Cryptology – EUROCRYPT 2020, Vol.12107, p.64-93 [Peer Reviewed Journal]

International Association for Cryptologic Research 2020 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0302-9743 ;ISBN: 9783030457266 ;ISBN: 3030457265 ;EISSN: 1611-3349 ;EISBN: 9783030457273 ;EISBN: 3030457273 ;DOI: 10.1007/978-3-030-45727-3_3

Digital Resources/Online E-Resources

7
Advances and Open Problems in Federated Learning
Material Type:
Article
Add to My Research

Advances and Open Problems in Federated Learning

Foundations and trends in machine learning, 2021-01, Vol.14 (1-2), p.1-210 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1935-8237 ;EISSN: 1935-8245 ;DOI: 10.1561/2200000083

Digital Resources/Online E-Resources

8
Internet of things security: A top-down survey
Material Type:
Article
Add to My Research

Internet of things security: A top-down survey

Computer networks (Amsterdam, Netherlands : 1999), 2018-08, Vol.141, p.199-221 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1389-1286 ;EISSN: 1872-7069 ;DOI: 10.1016/j.comnet.2018.03.012

Digital Resources/Online E-Resources

9
Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache Processing
Material Type:
Article
Add to My Research

Acceleration of Classic McEliece Post-Quantum Cryptosystem with Cache Processing

IEEE MICRO, 2024-01, Vol.44 (1), p.59-68 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0272-1732 ;EISSN: 1937-4143 ;DOI: 10.1109/MM.2023.3304425

Digital Resources/Online E-Resources

10
Preserving privacy in speaker and speech characterisation
Material Type:
Article
Add to My Research

Preserving privacy in speaker and speech characterisation

Computer speech & language, 2019-11, Vol.58, p.441-480 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0885-2308 ;EISSN: 1095-8363 ;DOI: 10.1016/j.csl.2019.06.001

Digital Resources/Online E-Resources

11
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers
Material Type:
Conference Proceeding
Add to My Research

Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing against strongSwan and Electromagnetic Emanations in Microcontrollers

CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, p.1857-1874

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/3133956.3134028

Digital Resources/Online E-Resources

12
Physical ZKP protocols for Nurimisaki and Kurodoko
Material Type:
Article
Add to My Research

Physical ZKP protocols for Nurimisaki and Kurodoko

Theoretical computer science, 2023-09, Vol.972 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2023.114071

Digital Resources/Online E-Resources

13
How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition
Material Type:
Article
Add to My Research

How to construct physical zero-knowledge proofs for puzzles with a “single loop” condition

Theoretical computer science, 2021-10, Vol.888, p.41-55 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1879-2294 ;EISSN: 1879-2294 ;DOI: 10.1016/j.tcs.2021.07.019

Digital Resources/Online E-Resources

14
Sharp: Short Relaxed Range Proofs
Material Type:
Conference Proceeding
Add to My Research

Sharp: Short Relaxed Range Proofs

Attribution ;ISBN: 1450394507 ;ISBN: 9781450394505 ;DOI: 10.1145/3548606.3560628

Digital Resources/Online E-Resources

15
Comparing the Difficulty of Factorization and Discrete Logarithm: A 240-Digit Experiment
Material Type:
Book Chapter
Add to My Research

Comparing the Difficulty of Factorization and Discrete Logarithm: A 240-Digit Experiment

Advances in Cryptology – CRYPTO 2020, 2020, Vol.12171, p.62-91 [Peer Reviewed Journal]

International Association for Cryptologic Research 2020 ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0302-9743 ;ISBN: 3030568792 ;ISBN: 9783030568795 ;EISSN: 1611-3349 ;EISBN: 3030568806 ;EISBN: 9783030568801 ;DOI: 10.1007/978-3-030-56880-1_3

Digital Resources/Online E-Resources

16
A classification of ECM-friendly families using modular curves
Material Type:
Article
Add to My Research

A classification of ECM-friendly families using modular curves

Mathematics of computation, 2022 (91), p.1405-1436 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0025-5718 ;EISSN: 1088-6842 ;DOI: 10.1090/mcom/3697

Digital Resources/Online E-Resources

17
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
Material Type:
Article
Add to My Research

Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

International journal of information security, 2024, Vol.15 (2), p.148-167 [Peer Reviewed Journal]

Attribution ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.4236/jis.2024.152010

Digital Resources/Online E-Resources

18
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation
Material Type:
Article
Add to My Research

A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation

IEEE transactions on intelligent transportation systems, 2019-12, Vol.20 (12), p.4405-4414 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1524-9050 ;EISSN: 1558-0016 ;DOI: 10.1109/TITS.2018.2885054

Digital Resources/Online E-Resources

19
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
Material Type:
Article
Add to My Research

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

Cryptography, 2021-12, Vol.5 (4), p.38 [Peer Reviewed Journal]

2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 2410-387X ;EISSN: 2410-387X ;DOI: 10.3390/cryptography5040038

Full text available

20
DAGS: Key encapsulation using dyadic GS codes
Material Type:
Article
Add to My Research

DAGS: Key encapsulation using dyadic GS codes

Journal of mathematical cryptology, 2018-12, Vol.12 (4), p.221-239 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1862-2976 ;EISSN: 1862-2984 ;DOI: 10.1515/jmc-2018-0027

Full text available

Personalize your results

  1. Edit

Refine Search Results

Show only

  1. Peer-reviewed Journals (1,906)

Refine My Results

Creation Date 

From To
  1. Before 1998  (7)
  2. 1998 To 2003  (41)
  3. 2004 To 2009  (443)
  4. 2010 To 2016  (1,954)
  5. After 2016  (3,071)
  6. More options open sub menu

Language 

  1. English  (6,065)
  2. French  (666)
  3. Japanese  (158)
  4. Spanish  (4)
  5. Portuguese  (3)
  6. Hungarian  (1)
  7. Italian  (1)
  8. German  (1)
  9. Chinese  (1)
  10. More options open sub menu

Searching Remote Databases, Please Wait