-
1Academic Journal
المؤلفون: Arman Ahmad, S. Jagatheswari
المصدر: IEEE Access, Vol 13, Pp 3532-3545 (2025)
مصطلحات موضوعية: Medical IoT, authentication, lattice-based cryptography, post-quantum security, key agreement, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Xia Zhang, Haitao Deng, Rui Wu, Jingjing Ren, Yongjun Ren
المصدر: Scientific Reports, Vol 14, Iss 1, Pp 1-16 (2024)
مصطلحات موضوعية: Federated learning, Secure aggregation, Secret sharing, Post quantum security, Medicine, Science
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
3Academic Journal
المؤلفون: Arman Ahmad, S. Jagatheswari
المصدر: IEEE Access, Vol 12, Pp 157247-157259 (2024)
مصطلحات موضوعية: Medical IoT, authentication, security, lattice-based cryptography, post-quantum security, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
4Conference
المؤلفون: Arjona, Rosario, López González, Paula, Román, Roberto, Baturone, Iluminada, Varela Vaca, Ángel Jesús (Coordinador), Ceballos Guerrero, Rafael (Coordinador), Reina Quintero, Antonia María (Coordinador)
المساهمون: Varela Vaca, Ángel Jesús, Ceballos Guerrero, Rafael, Reina Quintero, Antonia María
مصطلحات موضوعية: Biometric template protection, Homomorphic encryption, Post-quantum security
Relation: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (2024), pp. 514-515.; Sevilla; https://idus.us.es/handle//11441/162116
-
5Academic Journal
المؤلفون: Padró Laimon, Carles
المساهمون: Universitat Politècnica de Catalunya. Departament de Matemàtiques, Universitat Politècnica de Catalunya. ISG-MAK - Information Security Group - Mathematics Applied to Cryptography
مصطلحات موضوعية: Àrees temàtiques de la UPC::Matemàtiques i estadística::Àlgebra, Matroids, Boolean polymatroids, Cryptography, Post-quantum security, Classificació AMS::52 Convex and discrete geometry::52B Polytopes and polyhedra
وصف الملف: application/pdf
Relation: https://link.springer.com/article/10.1007/s00026-024-00716-z; info:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2021-2023/PID2021-124928NB-I00/ES/RETOS EN CODIGOS ALGEBRAICOS Y EN CRIPTOGRAFIA BASADA EN LA TEORIA DE LA INFORMACION PARA UN ENTORNO DE COMUNICACIONES DIGITALES (ACITHEC)/; info:eu-repo/grantAgreement/AEI/Plan Estatal de Investigación Científica y Técnica y de Innovación 2017-2020/PID2019-109379RB-I00/ES/CRIPTOGRAFIA PARA RETOS DIGITALES EMERGENTES: ESCENARIOS MULTI-USUARIO Y SEGURIDAD POST-CUANTICA/; Padro, C. Efficient representation of lattice path matroids. "Annals of combinatorics", 29 Agost 2024; https://arxiv.org/pdf/2310.10489v3; http://hdl.handle.net/2117/416701
-
6Academic Journal
المساهمون: Ecole Polytechnique Fédérale de Lausanne (EPFL), Cryptologie symétrique, cryptologie fondée sur les codes et information quantique (COSMIQ), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Cryptology, arithmetic : algebraic methods for better algorithms (CARAMBA), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Algorithms, Computation, Image and Geometry (LORIA - ALGO), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement no. 714294 - acronym QUASYModo). Bart Mennink was supported by the Netherlands Organisation for Scientific Research (NWO) under grant VI.Vidi.203.099., European Project: 714294,ERC-2016-STG,QUASYModo(2017)
المصدر: ISSN: 3006-5496 ; IACR Communications in Cryptology ; https://inria.hal.science/hal-04328717 ; IACR Communications in Cryptology, 2024, 1-3 (4), ⟨10.62056/av4fvua5v⟩.
مصطلحات موضوعية: Block cipher, Length doubler, Post-quantum security, Superposition attacks, Security proofs, Double-AES, Cryptanalysis, [INFO]Computer Science [cs]
Relation: info:eu-repo/grantAgreement//714294/EU/Symmetric Cryptography in the Post-Quantum World/QUASYModo
-
7Academic Journal
المؤلفون: Yujin Oh, Kyungbae Jang, Anubhab Baksi, Hwajeong Seo
المصدر: Mathematics, Vol 12, Iss 9, p 1337 (2024)
مصطلحات موضوعية: quantum computer, ASCON, Grover’s search algorithm, post-quantum security, Mathematics, QA1-939
Relation: https://www.mdpi.com/2227-7390/12/9/1337; https://doaj.org/toc/2227-7390; https://doaj.org/article/7281c7133d5240e78984d405f192280a
-
8Academic Journal
المؤلفون: Jingyu Chen, Haitao Deng, Huachang Su, Minghao Yuan, Yongjun Ren
المصدر: Electronics, Vol 13, Iss 2, p 287 (2024)
مصطلحات موضوعية: threshold secret sharing, post-quantum security, lattice-based cryptography, Electronics, TK7800-8360
Relation: https://www.mdpi.com/2079-9292/13/2/287; https://doaj.org/toc/2079-9292; https://doaj.org/article/c169f9a52c4648fb8cc7961163123dec
-
9Academic Journal
المؤلفون: Weidong Du, Min Li, Liqiang Wu, Yiliang Han, Tanping Zhou, Xiaoyuan Yang
المصدر: Complex & Intelligent Systems, Vol 9, Iss 5, Pp 4923-4937 (2023)
مصطلحات موضوعية: Cross-device federated learning, Privacy-preserving, Robust, Efficient, Collusion-attack resistant, Post-quantum security, Electronic computers. Computer science, QA75.5-76.95, Information technology, T58.5-58.64
وصف الملف: electronic resource
-
10Academic Journal
المؤلفون: Xufeng Tao, Yan Qiang, Peng Wang, Yingsen Wang
المصدر: IEEE Access, Vol 11, Pp 9851-9858 (2023)
مصطلحات موضوعية: Identity-based encryption, matchmaking encryption, post-quantum security, Internet of Things, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
11Academic Journal
المؤلفون: Yongseok Lee, Jonghee Youn, Kevin Nam, Hyunyoung Oh, Yunheung Paek
المصدر: Computers, Vol 12, Iss 12, p 259 (2023)
مصطلحات موضوعية: post-quantum security, NTRU, key encapsulation mechanism, hardware architecture, ASIC, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
12Academic Journal
المؤلفون: Bowen Liu, Qiang Tang, Jianying Zhou
المصدر: IEEE Access, Vol 10, Pp 71598-71611 (2022)
مصطلحات موضوعية: Authenticated key exchange, post-quantum security, Internet of Things, modular framework, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
13Academic Journal
المؤلفون: Hülsing, Andreas, Kudinov, Mikhail, Ronen, Eyal, Yogev, Eylon
المصدر: Hülsing , A , Kudinov , M , Ronen , E & Yogev , E 2023 , SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost . in 2023 IEEE Symposium on Security and Privacy, SP 2023 . , 10179381 , Institute of Electrical and Electronics Engineers , pp. 1435-1453 , 44th IEEE Symposium on Security and Privacy, SP 2023 , San Francisco , United States , 21/05/23 . https://doi.org/10.1109/SP46215.2023.10179381
مصطلحات موضوعية: Hash based signatures, Post-quantum security, SPHINCS+
وصف الملف: application/pdf
-
14Academic Journal
المؤلفون: Dr. Joshua J. Tom, Dr. Nlerum P. Anebo, Dr. Bukola A. Onyekwelu, Adigwe Wilfred, Richard E. Eyo
المساهمون: Dr. Joshua J. Tom
المصدر: International Journal of Engineering and Advanced Technology (IJEAT), 12(5), 25-38, (2023-06-30)
مصطلحات موضوعية: Quantum Algorithm, Post Quantum Security, Classical Computers, Functional Cryptosystems, Multivariate, Supersingular Elliptic Curve Isogenies
Relation: https://doi.org/10.5281/zenodo.8073525; https://doi.org/10.5281/zenodo.8073526; oai:zenodo.org:8073526
-
15Academic Journal
المؤلفون: Arjona, Rosario, López González, Paula, Román Hajderek, Roberto, Baturone Castillo, María Iluminada
المساهمون: Universidad de Sevilla. Departamento de Electrónica y Electromagnetismo, Ministerio de Ciencia e Innovación (MICIN). España, Agencia Estatal de Investigación. España, European Union (UE)
مصطلحات موضوعية: Biometric template protection, Homomorphic encryption, Post-quantum security
Relation: Applied Sciences (Switzerland), 13 (2).; PDC2021-121589-I00; PID2020- 119397RB-I00; https://doi.org/10.3390/app13020757; https://idus.us.es/handle//11441/148405
-
16Academic Journal
المؤلفون: Larriba, Antonio M., López Rodríguez, Damián
المساهمون: Universitat Politècnica de València. Escola Tècnica Superior d'Enginyeria Informàtica, Universitat Politècnica de València
مصطلحات موضوعية: Cryptography, Distributed identification, One-time identification, Anonymous access, Post-quantum security, LENGUAJES Y SISTEMAS INFORMATICOS, 09.- Desarrollar infraestructuras resilientes, promover la industrialización inclusiva y sostenible, y fomentar la innovación, 16.- Promover sociedades pacíficas e inclusivas para el desarrollo sostenible, facilitar acceso a la justicia para todos y crear instituciones eficaces, responsables e inclusivas a todos los niveles
Relation: IEEE Transactions on Information Forensics and Security; https://doi.org/10.1109/TIFS.2022.3226561; urn:issn:1556-6013; http://hdl.handle.net/10251/199023
-
17Academic Journal
المؤلفون: Iason Papadopoulos, Jiabo Wang
المصدر: Cryptography; Volume 7; Issue 1; Pages: 2
مصطلحات موضوعية: Kyber, Polar Codes, public key encryption, module LWE, decryption failure rate, post-quantum security
وصف الملف: application/pdf
Relation: Hardware Security; https://dx.doi.org/10.3390/cryptography7010002
-
18Academic Journal
المصدر: Applied Sciences; Volume 13; Issue 2; Pages: 757
مصطلحات موضوعية: biometric template protection, homomorphic encryption, post-quantum security
جغرافية الموضوع: agris
وصف الملف: application/pdf
Relation: Applied Biosciences and Bioengineering; https://dx.doi.org/10.3390/app13020757
الاتاحة: https://doi.org/10.3390/app13020757
-
19Academic Journal
المؤلفون: Naya Nagy, Marius Nagy, Ghadeer Alazman, Zahra Hawaidi, Saja Mustafa Alsulaibikh, Layla Alabbad, Sadeem Alfaleh, Areej Aljuaid
المصدر: Entropy, Vol 25, Iss 1461, p 1461 (2023)
مصطلحات موضوعية: honeypot, post-quantum security, quantum security, quantum networks, Science, Astrophysics, QB460-466, Physics, QC1-999
-
20Book
المؤلفون: Serhii Yevseiev, Ruslan Hryshchuk, Kateryna Molodetska, Mariia Nazarkevych, Volodymyr Hrytsyk, Oleksandr Milov, Olha Korol, Stanislav Milevskyi, Roman Korolev, Serhii Pohasii, Andrii Tkachov, Yevgen Melenti, Oleksandr Lavrut, Alla Havrylova, Serhii Herasуmov, Halyna Holotaistrova, Dmytro Avramenko, Roman Vozniak, Oleksandr Voitko, Kseniia Yerhidzei, Serhii Mykus, Yurii Pribyliev, Olena Akhiiezer, Mykhailo Shyshkin, Ivan Opirskyy, Oleh Harasymchuk, Olha Mykhaylova, Yuriy Nakonechnyy, Marta Stakhiv, Bogdan Tomashevsky
مصطلحات موضوعية: Concept of a multi-loop security system, socio-cyber-physical systems, post-quantum security mechanisms
Relation: oai:zenodo.org:7019277