skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 996  for All Library Resources

Results 1 2 3 4 5 next page
Show only
Refined by: Database: SpringerOpen remove
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Ascon v1.2: Lightweight Authenticated Encryption and Hashing
Material Type:
Article
Add to My Research

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

Journal of cryptology, 2021-07, Vol.34 (3) [Peer Reviewed Journal]

The Author(s) 2021 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09398-9

Digital Resources/Online E-Resources

2
Verification of Quantum Computation: An Overview of Existing Approaches
Material Type:
Article
Add to My Research

Verification of Quantum Computation: An Overview of Existing Approaches

Theory of computing systems, 2019-05, Vol.63 (4), p.715-808 [Peer Reviewed Journal]

The Author(s) 2018 ;Theory of Computing Systems is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1432-4350 ;EISSN: 1433-0490 ;DOI: 10.1007/s00224-018-9872-3

Full text available

3
Group signatures and more from isogenies and lattices: generic, simple, and efficient
Material Type:
Article
Add to My Research

Group signatures and more from isogenies and lattices: generic, simple, and efficient

Designs, codes, and cryptography, 2023-06, Vol.91 (6), p.2141-2200 [Peer Reviewed Journal]

The Author(s) 2023 ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-023-01192-x

Digital Resources/Online E-Resources

4
A survey on lattice-based digital signature
Material Type:
Article
Add to My Research

A survey on lattice-based digital signature

Cybersecurity (Singapore), 2024-12, Vol.7 (1), p.7-18 [Peer Reviewed Journal]

The Author(s) 2024 ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2523-3246 ;DOI: 10.1186/s42400-023-00198-1

Full text available

5
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography
Material Type:
Article
Add to My Research

Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptography

Journal of cryptographic engineering, 2024, Vol.14 (1), p.1-18 [Peer Reviewed Journal]

The Author(s) 2023 ;ISSN: 2190-8508 ;EISSN: 2190-8516 ;DOI: 10.1007/s13389-023-00332-2

Digital Resources/Online E-Resources

6
Quantum-safe cryptography: crossroads of coding theory and cryptography
Material Type:
Article
Add to My Research

Quantum-safe cryptography: crossroads of coding theory and cryptography

Science China. Information sciences, 2022, Vol.65 (1) [Peer Reviewed Journal]

The Author(s) 2021 ;ISSN: 1674-733X ;EISSN: 1869-1919 ;DOI: 10.1007/s11432-021-3354-7

Digital Resources/Online E-Resources

7
Security estimation of LWE via BKW algorithms
Material Type:
Article
Add to My Research

Security estimation of LWE via BKW algorithms

Cybersecurity (Singapore), 2023-12, Vol.6 (1), p.24-17, Article 24 [Peer Reviewed Journal]

The Author(s) 2023 ;The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2523-3246 ;EISSN: 2523-3246 ;DOI: 10.1186/s42400-023-00158-9

Full text available

8
Hardness estimates of the code equivalence problem in the rank metric
Material Type:
Article
Add to My Research

Hardness estimates of the code equivalence problem in the rank metric

Designs, codes, and cryptography, 2024-01, Vol.92 (3), p.833-862 [Peer Reviewed Journal]

The Author(s) 2023 ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-023-01338-x

Digital Resources/Online E-Resources

9
On the equivalence of two post-quantum cryptographic families
Material Type:
Article
Add to My Research

On the equivalence of two post-quantum cryptographic families

Annali di matematica pura ed applicata, 2023-04, Vol.202 (2), p.967-991 [Peer Reviewed Journal]

The Author(s) 2022 ;ISSN: 0373-3114 ;EISSN: 1618-1891 ;DOI: 10.1007/s10231-022-01267-x

Digital Resources/Online E-Resources

10
Implementing Post-quantum Cryptography for Developers
Material Type:
Article
Add to My Research

Implementing Post-quantum Cryptography for Developers

SN computer science, 2023-07, Vol.4 (4) [Peer Reviewed Journal]

The Author(s) 2023 ;EISSN: 2661-8907 ;DOI: 10.1007/s42979-023-01724-1

Digital Resources/Online E-Resources

11
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
Material Type:
Article
Add to My Research

Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra

Applicable algebra in engineering, communication and computing, 2021, Vol.32 (1), p.81-96 [Peer Reviewed Journal]

The Author(s) 2019 ;ISSN: 0938-1279 ;EISSN: 1432-0622 ;DOI: 10.1007/s00200-019-00402-1

Digital Resources/Online E-Resources

12
Secure video communication using firefly optimization and visual cryptography
Material Type:
Article
Add to My Research

Secure video communication using firefly optimization and visual cryptography

The Artificial intelligence review, 2022-04, Vol.55 (4), p.2997-3017 [Peer Reviewed Journal]

The Author(s), under exclusive licence to Springer Nature B.V. 2021 ;COPYRIGHT 2022 Springer ;The Author(s), under exclusive licence to Springer Nature B.V. 2021. ;ISSN: 0269-2821 ;EISSN: 1573-7462 ;DOI: 10.1007/s10462-021-10070-8

Full text available

13
The Energy Consumption of Blockchain Technology: Beyond Myth
Material Type:
Article
Add to My Research

The Energy Consumption of Blockchain Technology: Beyond Myth

Business & information systems engineering, 2020-12, Vol.62 (6), p.599-608 [Peer Reviewed Journal]

The Author(s) 2020 ;The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1867-0202 ;ISSN: 2363-7005 ;EISSN: 1867-0202 ;DOI: 10.1007/s12599-020-00656-x

Full text available

14
CubeSat quantum communications mission
Material Type:
Article
Add to My Research

CubeSat quantum communications mission

EPJ quantum technology, 2017-12, Vol.4 (1), p.1-20, Article 6 [Peer Reviewed Journal]

The Author(s) 2017 ;EPJ Quantum Technology is a copyright of Springer, 2017. ;ISSN: 2196-0763 ;EISSN: 2196-0763 ;DOI: 10.1140/epjqt/s40507-017-0060-1

Full text available

15
Geometry of Banach Spaces: A New Route Towards Position Based Cryptography
Material Type:
Article
Add to My Research

Geometry of Banach Spaces: A New Route Towards Position Based Cryptography

Communications in mathematical physics, 2022-09, Vol.394 (2), p.625-678 [Peer Reviewed Journal]

The Author(s) 2022 ;ISSN: 0010-3616 ;EISSN: 1432-0916 ;DOI: 10.1007/s00220-022-04407-9

Digital Resources/Online E-Resources

16
An overview of cryptographic primitives for possible use in 5G and beyond
Material Type:
Article
Add to My Research

An overview of cryptographic primitives for possible use in 5G and beyond

Science China. Information sciences, 2020, Vol.63 (12) [Peer Reviewed Journal]

The Author(s) 2020 ;ISSN: 1674-733X ;EISSN: 1869-1919 ;DOI: 10.1007/s11432-019-2907-4

Digital Resources/Online E-Resources

17
Entropy Accumulation
Material Type:
Article
Add to My Research

Entropy Accumulation

Communications in mathematical physics, 2020-11, Vol.379 (3), p.867-913 [Peer Reviewed Journal]

The Author(s) 2020 ;ISSN: 0010-3616 ;EISSN: 1432-0916 ;DOI: 10.1007/s00220-020-03839-5

Digital Resources/Online E-Resources

18
Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework
Material Type:
Article
Add to My Research

Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework

Information systems frontiers, 2022-04, Vol.24 (2), p.393-414 [Peer Reviewed Journal]

The Author(s) 2020 ;The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1387-3326 ;EISSN: 1572-9419 ;DOI: 10.1007/s10796-020-10044-1 ;PMID: 32837262

Full text available

19
Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware
Material Type:
Article
Add to My Research

Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware

Journal of cryptographic engineering, 2021-11, Vol.11 (4), p.317-327 [Peer Reviewed Journal]

The Author(s) 2021 ;ISSN: 2190-8508 ;EISSN: 2190-8516 ;DOI: 10.1007/s13389-021-00258-7

Digital Resources/Online E-Resources

20
Improved scheme and evaluation method for progressive visual cryptography
Material Type:
Article
Add to My Research

Improved scheme and evaluation method for progressive visual cryptography

EURASIP Journal on Information Security, 2022-12, Vol.2022 (1), p.1-13 [Peer Reviewed Journal]

The Author(s) 2022 ;EISSN: 2510-523X ;DOI: 10.1186/s13635-022-00136-7

Full text available

Results 1 - 20 of 996  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Show only

  1. Peer-reviewed Journals (959)

Refine My Results

Creation Date 

From To
  1. Before 2005  (7)
  2. 2005 To 2008  (22)
  3. 2009 To 2012  (39)
  4. 2013 To 2017  (102)
  5. After 2017  (833)
  6. More options open sub menu

Resource Type 

  1. Articles  (971)
  2. Books  (16)
  3. magazinearticle  (9)
  4. More options open sub menu

Language 

  1. English  (986)
  2. Japanese  (49)
  3. German  (10)
  4. More options open sub menu

Searching Remote Databases, Please Wait