Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Retracted: Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System UpgradeJournal of sensors, 2023-12, Vol.2023, p.1-1 [Peer Reviewed Journal]Copyright © 2023 Journal of Sensors. ;ISSN: 1687-725X ;EISSN: 1687-7268 ;DOI: 10.1155/2023/9817242Full text available |
|
2 |
Material Type: Article
|
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposalsIET information security, 2023-03, Vol.17 (2), p.159-160 [Peer Reviewed Journal]2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/ise2.12105Full text available |
|
3 |
Material Type: Article
|
A Solution to Defend Cloud Auditing Protocols from A Potential AttackJournal of physics. Conference series, 2020-01, Vol.1437 (1), p.12112 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1437/1/012112Full text available |
|
4 |
Material Type: Article
|
Cryptanalysis Attacks for Factoring Generalized Takagi's Scheme N = prqsNew trends in mathematical sciences, 2022-06, Vol.10 (1), p.54-662022. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2147-5520 ;DOI: 10.20852/ntmsci.2022.464Full text available |
|
5 |
Material Type: Article
|
A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n ZJournal of physics. Conference series, 2019-03, Vol.1176 (4), p.42019 [Peer Reviewed Journal]2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1176/4/042019Full text available |
|
6 |
Material Type: Article
|
Quantum secret kept for a dayNature (London), 2016-10, Vol.538 (7624), p.142-142 [Peer Reviewed Journal]Copyright Nature Publishing Group Oct 13, 2016 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/538142c ;CODEN: NATUASFull text available |
|
7 |
Material Type: Article
|
CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTSBulletin of "Carol I" National Defense University, 2018-01, Vol.7 (1), p.48 [Peer Reviewed Journal]2018. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2284-936X ;EISSN: 2284-9378Full text available |
|
8 |
Material Type: Conference Proceeding
|
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank ProblemsDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17Digital Resources/Online E-Resources |
|
9 |
Material Type: Article
|
Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based CryptographyBeijing da xue xue bao, 2021-01, Vol.57 (4), p.595-604Copyright Acta Scientiarum Naturalium Universitatis Pekinenis 2021 ;ISSN: 0479-8023 ;DOI: 10.13209/j.0479-8023.2021.054Full text available |
|
10 |
Material Type: Article
|
Publisher's Note: “Demonstration of a 6 state-4 state reference frame independent channel for quantum key distribution” [Appl. Phys. Lett. 115, 211103 (2019)]Applied physics letters, 2019-12, Vol.115 (23) [Peer Reviewed Journal]Author(s) ;2019 Author(s). Published under license by AIP Publishing. ;ISSN: 0003-6951 ;EISSN: 1077-3118 ;DOI: 10.1063/1.5139502 ;CODEN: APPLABFull text available |
|
11 |
Material Type: Conference Proceeding
|
Breaking Symmetric Cryptosystems Using Quantum Period FindingDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8Digital Resources/Online E-Resources |
|
12 |
Material Type: Article
|
Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messagesT.A.S.K. quarterly, 2024-01, Vol.26 (3)ISSN: 1428-6394 ;DOI: 10.34808/ksxc-hn17Full text available |
|
13 |
Material Type: Article
|
Passive BB84 decoy-state protocol with a flawed sourceJournal of physics. Conference series, 2021-07, Vol.1984 (1), p.12002 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1984/1/012002Full text available |
|
14 |
Material Type: Article
|
On LCD codes over Z 4Journal of physics. Conference series, 2021-05, Vol.1850 (1), p.12021 [Peer Reviewed Journal]Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1850/1/012021Full text available |
|
15 |
Material Type: Article
|
A complete one-way function based on a finite rank free Z x Z-moduleJournal of mathematical sciences (New York, N.Y.), 2013-07, Vol.192 (3), p.307 [Peer Reviewed Journal]COPYRIGHT 2013 Springer ;ISSN: 1072-3374 ;EISSN: 1573-8795Full text available |
|
16 |
Material Type: Article
|
The Impact of Quantum Computing on Present CryptographyInternational journal of advanced computer science & applications, 2018, Vol.9 (3)2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;info:eu-repo/semantics/openAccess ;ISSN: 2158-107X ;EISSN: 2156-5570 ;DOI: 10.14569/IJACSA.2018.090354Full text available |
|
17 |
Material Type: Conference Proceeding
|
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeDistributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2810103.2813707Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
Secure quantum key distributionNature photonics, 2014-08, Vol.8 (8), p.595-604 [Peer Reviewed Journal]Copyright Nature Publishing Group Aug 2014 ;ISSN: 1749-4885 ;EISSN: 1749-4893 ;DOI: 10.1038/nphoton.2014.149Full text available |
|
19 |
Material Type: Article
|
Overcoming the rate-distance limit of quantum key distribution without quantum repeatersNature (London), 2018-05, Vol.557 (7705), p.400-403 [Peer Reviewed Journal]COPYRIGHT 2018 Nature Publishing Group ;COPYRIGHT 2018 Nature Publishing Group ;Copyright Nature Publishing Group May 17, 2018 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/s41586-018-0066-6 ;PMID: 29720656Full text available |
|
20 |
Material Type: Article
|
Post-quantum cryptography Algorithm's standardization and performance analysisArray (New York), 2022-09, Vol.15, p.100242, Article 100242 [Peer Reviewed Journal]2022 The Author(s) ;ISSN: 2590-0056 ;EISSN: 2590-0056 ;DOI: 10.1016/j.array.2022.100242Full text available |