skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 2,176,855  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Retracted: Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade
Material Type:
Article
Add to My Research

Retracted: Industrial Information Security Detection and Protection: Monitoring and Warning Platform Architecture Design and Cryptographic Antitheft Technology System Upgrade

Journal of sensors, 2023-12, Vol.2023, p.1-1 [Peer Reviewed Journal]

Copyright © 2023 Journal of Sensors. ;ISSN: 1687-725X ;EISSN: 1687-7268 ;DOI: 10.1155/2023/9817242

Full text available

2
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Material Type:
Article
Add to My Research

Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals

IET information security, 2023-03, Vol.17 (2), p.159-160 [Peer Reviewed Journal]

2022 The Authors. published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology. ;ISSN: 1751-8709 ;EISSN: 1751-8717 ;DOI: 10.1049/ise2.12105

Full text available

3
A Solution to Defend Cloud Auditing Protocols from A Potential Attack
Material Type:
Article
Add to My Research

A Solution to Defend Cloud Auditing Protocols from A Potential Attack

Journal of physics. Conference series, 2020-01, Vol.1437 (1), p.12112 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2020. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1437/1/012112

Full text available

4
Cryptanalysis Attacks for Factoring Generalized Takagi's Scheme N = prqs
Material Type:
Article
Add to My Research

Cryptanalysis Attacks for Factoring Generalized Takagi's Scheme N = prqs

New trends in mathematical sciences, 2022-06, Vol.10 (1), p.54-66

2022. This work is published under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2147-5520 ;DOI: 10.20852/ntmsci.2022.464

Full text available

5
A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n Z
Material Type:
Article
Add to My Research

A New Method for Differential Cryptanalysis on Addition on Residue Class Ring Z/2 n Z

Journal of physics. Conference series, 2019-03, Vol.1176 (4), p.42019 [Peer Reviewed Journal]

2019. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1176/4/042019

Full text available

6
Quantum secret kept for a day
Material Type:
Article
Add to My Research

Quantum secret kept for a day

Nature (London), 2016-10, Vol.538 (7624), p.142-142 [Peer Reviewed Journal]

Copyright Nature Publishing Group Oct 13, 2016 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/538142c ;CODEN: NATUAS

Full text available

7
CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS
Material Type:
Article
Add to My Research

CRYPTOGRAPHY AND STEGANOGRAPHY, METHODS TO HIDE INTELLIGENCE PRODUCTS

Bulletin of "Carol I" National Defense University, 2018-01, Vol.7 (1), p.48 [Peer Reviewed Journal]

2018. This work is published under https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2284-936X ;EISSN: 2284-9378

Full text available

8
Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems
Material Type:
Conference Proceeding
Add to My Research

Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-030-64837-4_17

Digital Resources/Online E-Resources

9
Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based Cryptography
Material Type:
Article
Add to My Research

Hardware Optimization and Evaluation for Crucial Modules of Lattice-Based Cryptography

Beijing da xue xue bao, 2021-01, Vol.57 (4), p.595-604

Copyright Acta Scientiarum Naturalium Universitatis Pekinenis 2021 ;ISSN: 0479-8023 ;DOI: 10.13209/j.0479-8023.2021.054

Full text available

10
Publisher's Note: “Demonstration of a 6 state-4 state reference frame independent channel for quantum key distribution” [Appl. Phys. Lett. 115, 211103 (2019)]
Material Type:
Article
Add to My Research

Publisher's Note: “Demonstration of a 6 state-4 state reference frame independent channel for quantum key distribution” [Appl. Phys. Lett. 115, 211103 (2019)]

Applied physics letters, 2019-12, Vol.115 (23) [Peer Reviewed Journal]

Author(s) ;2019 Author(s). Published under license by AIP Publishing. ;ISSN: 0003-6951 ;EISSN: 1077-3118 ;DOI: 10.1063/1.5139502 ;CODEN: APPLAB

Full text available

11
Breaking Symmetric Cryptosystems Using Quantum Period Finding
Material Type:
Conference Proceeding
Add to My Research

Breaking Symmetric Cryptosystems Using Quantum Period Finding

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1007/978-3-662-53008-5_8

Digital Resources/Online E-Resources

12
Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages
Material Type:
Article
Add to My Research

Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages

T.A.S.K. quarterly, 2024-01, Vol.26 (3)

ISSN: 1428-6394 ;DOI: 10.34808/ksxc-hn17

Full text available

13
Passive BB84 decoy-state protocol with a flawed source
Material Type:
Article
Add to My Research

Passive BB84 decoy-state protocol with a flawed source

Journal of physics. Conference series, 2021-07, Vol.1984 (1), p.12002 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1984/1/012002

Full text available

14
On LCD codes over Z 4
Material Type:
Article
Add to My Research

On LCD codes over Z 4

Journal of physics. Conference series, 2021-05, Vol.1850 (1), p.12021 [Peer Reviewed Journal]

Published under licence by IOP Publishing Ltd ;2021. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1742-6588 ;EISSN: 1742-6596 ;DOI: 10.1088/1742-6596/1850/1/012021

Full text available

15
A complete one-way function based on a finite rank free Z x Z-module
Material Type:
Article
Add to My Research

A complete one-way function based on a finite rank free Z x Z-module

Journal of mathematical sciences (New York, N.Y.), 2013-07, Vol.192 (3), p.307 [Peer Reviewed Journal]

COPYRIGHT 2013 Springer ;ISSN: 1072-3374 ;EISSN: 1573-8795

Full text available

16
The Impact of Quantum Computing on Present Cryptography
Material Type:
Article
Add to My Research

The Impact of Quantum Computing on Present Cryptography

International journal of advanced computer science & applications, 2018, Vol.9 (3)

2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;info:eu-repo/semantics/openAccess ;ISSN: 2158-107X ;EISSN: 2156-5570 ;DOI: 10.14569/IJACSA.2018.090354

Full text available

17
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
Material Type:
Conference Proceeding
Add to My Research

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Distributed under a Creative Commons Attribution 4.0 International License ;DOI: 10.1145/2810103.2813707

Digital Resources/Online E-Resources

18
Secure quantum key distribution
Material Type:
Article
Add to My Research

Secure quantum key distribution

Nature photonics, 2014-08, Vol.8 (8), p.595-604 [Peer Reviewed Journal]

Copyright Nature Publishing Group Aug 2014 ;ISSN: 1749-4885 ;EISSN: 1749-4893 ;DOI: 10.1038/nphoton.2014.149

Full text available

19
Overcoming the rate-distance limit of quantum key distribution without quantum repeaters
Material Type:
Article
Add to My Research

Overcoming the rate-distance limit of quantum key distribution without quantum repeaters

Nature (London), 2018-05, Vol.557 (7705), p.400-403 [Peer Reviewed Journal]

COPYRIGHT 2018 Nature Publishing Group ;COPYRIGHT 2018 Nature Publishing Group ;Copyright Nature Publishing Group May 17, 2018 ;ISSN: 0028-0836 ;EISSN: 1476-4687 ;DOI: 10.1038/s41586-018-0066-6 ;PMID: 29720656

Full text available

20
Post-quantum cryptography Algorithm's standardization and performance analysis
Material Type:
Article
Add to My Research

Post-quantum cryptography Algorithm's standardization and performance analysis

Array (New York), 2022-09, Vol.15, p.100242, Article 100242 [Peer Reviewed Journal]

2022 The Author(s) ;ISSN: 2590-0056 ;EISSN: 2590-0056 ;DOI: 10.1016/j.array.2022.100242

Full text available

Results 1 - 20 of 2,176,855  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (23,719)

Refine My Results

Creation Date 

From To
  1. Before 1957  (40,302)
  2. 1957 To 1972  (27,555)
  3. 1973 To 1988  (208,910)
  4. 1989 To 2005  (513,192)
  5. After 2005  (1,379,906)
  6. More options open sub menu

Subject 

  1. Cryptography  (2,135,897)
  2. Physics  (2,103,436)
  3. Education  (2,101,259)
  4. Advertising  (2,101,061)
  5. Seals  (2,101,009)
  6. Display  (2,101,005)
  7. Signs  (844,980)
  8. Displaying  (844,973)
  9. Labels Or Name-Plates  (844,973)
  10. Electricity  (548,237)
  11. Globes  (473,024)
  12. Diagrams  (473,023)
  13. Planetaria  (473,022)
  14. Educational Or Demonstration Appliances  (473,021)
  15. Appliances For Teaching, Or Communicating With, The Blind,deaf Or Mute  (473,021)
  16. Counting  (407,375)
  17. Computing  (407,337)
  18. Calculating  (407,323)
  19. Optics  (337,556)
  20. Electric Digital Data Processing  (288,539)
  21. More options open sub menu

Language 

  1. English  (1,879,881)
  2. Chinese  (511,696)
  3. French  (227,043)
  4. German  (160,113)
  5. Korean  (124,369)
  6. Japanese  (115,226)
  7. Spanish  (23,191)
  8. Russian  (17,902)
  9. Portuguese  (11,627)
  10. Italian  (6,223)
  11. Swedish  (3,980)
  12. Dutch  (3,397)
  13. Finnish  (2,649)
  14. Danish  (2,623)
  15. Polish  (2,445)
  16. Norwegian  (1,763)
  17. Ukrainian  (1,683)
  18. Czech  (1,399)
  19. Turkish  (1,229)
  20. Romanian  (673)
  21. More options open sub menu

Searching Remote Databases, Please Wait