Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Ascon v1.2: Lightweight Authenticated Encryption and HashingJournal of cryptology, 2021-07, Vol.34 (3) [Peer Reviewed Journal]The Author(s) 2021 ;ISSN: 0933-2790 ;EISSN: 1432-1378 ;DOI: 10.1007/s00145-021-09398-9Digital Resources/Online E-Resources |
|
2 |
Material Type: Article
|
Verification of Quantum Computation: An Overview of Existing ApproachesTheory of computing systems, 2019-05, Vol.63 (4), p.715-808 [Peer Reviewed Journal]The Author(s) 2018 ;Theory of Computing Systems is a copyright of Springer, (2018). All Rights Reserved. © 2018. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1432-4350 ;EISSN: 1433-0490 ;DOI: 10.1007/s00224-018-9872-3Full text available |
|
3 |
Material Type: Article
|
Group signatures and more from isogenies and lattices: generic, simple, and efficientDesigns, codes, and cryptography, 2023-06, Vol.91 (6), p.2141-2200 [Peer Reviewed Journal]The Author(s) 2023 ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-023-01192-xDigital Resources/Online E-Resources |
|
4 |
Material Type: Article
|
A survey on lattice-based digital signatureCybersecurity (Singapore), 2024-12, Vol.7 (1), p.7-18 [Peer Reviewed Journal]The Author(s) 2024 ;The Author(s) 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;EISSN: 2523-3246 ;DOI: 10.1186/s42400-023-00198-1Full text available |
|
5 |
Material Type: Article
|
Uniform instruction set extensions for multiplications in contemporary and post-quantum cryptographyJournal of cryptographic engineering, 2024, Vol.14 (1), p.1-18 [Peer Reviewed Journal]The Author(s) 2023 ;ISSN: 2190-8508 ;EISSN: 2190-8516 ;DOI: 10.1007/s13389-023-00332-2Digital Resources/Online E-Resources |
|
6 |
Material Type: Article
|
Quantum-safe cryptography: crossroads of coding theory and cryptographyScience China. Information sciences, 2022, Vol.65 (1) [Peer Reviewed Journal]The Author(s) 2021 ;ISSN: 1674-733X ;EISSN: 1869-1919 ;DOI: 10.1007/s11432-021-3354-7Digital Resources/Online E-Resources |
|
7 |
Material Type: Article
|
Security estimation of LWE via BKW algorithmsCybersecurity (Singapore), 2023-12, Vol.6 (1), p.24-17, Article 24 [Peer Reviewed Journal]The Author(s) 2023 ;The Author(s) 2023. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 2523-3246 ;EISSN: 2523-3246 ;DOI: 10.1186/s42400-023-00158-9Full text available |
|
8 |
Material Type: Article
|
Hardness estimates of the code equivalence problem in the rank metricDesigns, codes, and cryptography, 2024-01, Vol.92 (3), p.833-862 [Peer Reviewed Journal]The Author(s) 2023 ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-023-01338-xDigital Resources/Online E-Resources |
|
9 |
Material Type: Article
|
On the equivalence of two post-quantum cryptographic familiesAnnali di matematica pura ed applicata, 2023-04, Vol.202 (2), p.967-991 [Peer Reviewed Journal]The Author(s) 2022 ;ISSN: 0373-3114 ;EISSN: 1618-1891 ;DOI: 10.1007/s10231-022-01267-xDigital Resources/Online E-Resources |
|
10 |
Material Type: Article
|
Implementing Post-quantum Cryptography for DevelopersSN computer science, 2023-07, Vol.4 (4) [Peer Reviewed Journal]The Author(s) 2023 ;EISSN: 2661-8907 ;DOI: 10.1007/s42979-023-01724-1Digital Resources/Online E-Resources |
|
11 |
Material Type: Article
|
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebraApplicable algebra in engineering, communication and computing, 2021, Vol.32 (1), p.81-96 [Peer Reviewed Journal]The Author(s) 2019 ;ISSN: 0938-1279 ;EISSN: 1432-0622 ;DOI: 10.1007/s00200-019-00402-1Digital Resources/Online E-Resources |
|
12 |
Material Type: Article
|
Secure video communication using firefly optimization and visual cryptographyThe Artificial intelligence review, 2022-04, Vol.55 (4), p.2997-3017 [Peer Reviewed Journal]The Author(s), under exclusive licence to Springer Nature B.V. 2021 ;COPYRIGHT 2022 Springer ;The Author(s), under exclusive licence to Springer Nature B.V. 2021. ;ISSN: 0269-2821 ;EISSN: 1573-7462 ;DOI: 10.1007/s10462-021-10070-8Full text available |
|
13 |
Material Type: Article
|
The Energy Consumption of Blockchain Technology: Beyond MythBusiness & information systems engineering, 2020-12, Vol.62 (6), p.599-608 [Peer Reviewed Journal]The Author(s) 2020 ;The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1867-0202 ;ISSN: 2363-7005 ;EISSN: 1867-0202 ;DOI: 10.1007/s12599-020-00656-xFull text available |
|
14 |
Material Type: Article
|
CubeSat quantum communications missionEPJ quantum technology, 2017-12, Vol.4 (1), p.1-20, Article 6 [Peer Reviewed Journal]The Author(s) 2017 ;EPJ Quantum Technology is a copyright of Springer, 2017. ;ISSN: 2196-0763 ;EISSN: 2196-0763 ;DOI: 10.1140/epjqt/s40507-017-0060-1Full text available |
|
15 |
Material Type: Article
|
Geometry of Banach Spaces: A New Route Towards Position Based CryptographyCommunications in mathematical physics, 2022-09, Vol.394 (2), p.625-678 [Peer Reviewed Journal]The Author(s) 2022 ;ISSN: 0010-3616 ;EISSN: 1432-0916 ;DOI: 10.1007/s00220-022-04407-9Digital Resources/Online E-Resources |
|
16 |
Material Type: Article
|
An overview of cryptographic primitives for possible use in 5G and beyondScience China. Information sciences, 2020, Vol.63 (12) [Peer Reviewed Journal]The Author(s) 2020 ;ISSN: 1674-733X ;EISSN: 1869-1919 ;DOI: 10.1007/s11432-019-2907-4Digital Resources/Online E-Resources |
|
17 |
Material Type: Article
|
Entropy AccumulationCommunications in mathematical physics, 2020-11, Vol.379 (3), p.867-913 [Peer Reviewed Journal]The Author(s) 2020 ;ISSN: 0010-3616 ;EISSN: 1432-0916 ;DOI: 10.1007/s00220-020-03839-5Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction FrameworkInformation systems frontiers, 2022-04, Vol.24 (2), p.393-414 [Peer Reviewed Journal]The Author(s) 2020 ;The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. ;ISSN: 1387-3326 ;EISSN: 1572-9419 ;DOI: 10.1007/s10796-020-10044-1 ;PMID: 32837262Full text available |
|
19 |
Material Type: Article
|
Exploring Parallelism to Improve the Performance of FrodoKEM in HardwareJournal of cryptographic engineering, 2021-11, Vol.11 (4), p.317-327 [Peer Reviewed Journal]The Author(s) 2021 ;ISSN: 2190-8508 ;EISSN: 2190-8516 ;DOI: 10.1007/s13389-021-00258-7Digital Resources/Online E-Resources |
|
20 |
Material Type: Article
|
Improved scheme and evaluation method for progressive visual cryptographyEURASIP Journal on Information Security, 2022-12, Vol.2022 (1), p.1-13 [Peer Reviewed Journal]The Author(s) 2022 ;EISSN: 2510-523X ;DOI: 10.1186/s13635-022-00136-7Full text available |