-
1Academic Journal
المؤلفون: Jiawei Bao, Jiangxia Ge, Rui Xue
المصدر: Cybersecurity, Vol 7, Iss 1, Pp 1-28 (2024)
مصطلحات موضوعية: Quantum random oracle model, Public key encryption, Security proof, Fujisaki-Okamoto transformation, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
Relation: https://doaj.org/toc/2523-3246
-
2
المؤلفون: Pereira, Daniel Filipe Figueiredo
مصطلحات موضوعية: Continuous Variables Quantum Key Distribution, Locally generated local oscillator, Polarization diverse, Security proof, Discrete modulated, Device imperfections, Probabilistic constellation shaping
وصف الملف: application/pdf
الاتاحة: http://hdl.handle.net/10773/41761
-
3Academic Journal
المؤلفون: JIN An-ran, LI He
المصدر: Guangtongxin yanjiu, Pp 24-31 (2023)
مصطلحات موضوعية: QKD, optical communication system, security proof, post-processing, Applied optics. Photonics, TA1501-1820
وصف الملف: electronic resource
-
4Dissertation/ Thesis
المؤلفون: Kerber, Thomas
المساهمون: Kiayias, Aggelos, Kohlweiss, Markulf
مصطلحات موضوعية: blockchains, privacy, zero-knowledge proofs, security proof handling, distributed ledgers, privacy features
-
5Academic Journal
المؤلفون: Matiyko, Alexandra, Alekseychuk, Anton
المصدر: Collection "Information Technology and Security"; Vol. 12 No. 1 (2024); 31-43 ; Сборник "Information Technology and Security"; Том 12 № 1 (2024); 31-43 ; Collection "Information Technology and Security"; Том 12 № 1 (2024); 31-43 ; 2518-1033 ; 2411-1031
مصطلحات موضوعية: криптографічний захист інформації, потоковий шифр, фільтрувальний генератор гами, функція переходів, алгебраїчна атака, статистична атака, обґрунтування стійкості, cryptographic protection of information, stream cipher, filter generator, transition function, algebraic attack, statistical attack, security proof
وصف الملف: application/pdf
Relation: https://its.iszzi.kpi.ua/article/view/306256/298534; https://its.iszzi.kpi.ua/article/view/306256
-
6Academic Journal
المؤلفون: Ya-Qian Lin, Meng Wang, Xiu-Qing Yang, Hong-Wei Liu
المصدر: Heliyon, Vol 9, Iss 2, Pp e13719- (2023)
مصطلحات موضوعية: Quantum key distribution, Security proof, Counterfactual communication, Science (General), Q1-390, Social sciences (General), H1-99
وصف الملف: electronic resource
-
7Academic Journal
المؤلفون: Naito, Yusuke, Sasaki, Yu, Sugawara, Takeshi
المصدر: IACR Transactions on Symmetric Cryptology; Vol. 2023 No. 4; 420-451 ; 2519-173X
مصطلحات موضوعية: Ascon, Authenticated Encryption, Key Commitment, Context Commitment, Differential Cryptanalysis, MILP, Security Proof, Zero Padding
وصف الملف: application/pdf
-
8Academic Journal
المؤلفون: Rui Zhang, Wendie Han, Lei Zhang, Lulu Wang, Xinyu Meng
المصدر: Sensors; Volume 23; Issue 9; Pages: 4198
مصطلحات موضوعية: mobile ad hoc networks, group key management, security proof, receiver restricted
وصف الملف: application/pdf
Relation: Internet of Things; https://dx.doi.org/10.3390/s23094198
الاتاحة: https://doi.org/10.3390/s23094198
-
9Academic Journal
المؤلفون: Imad El Ghoubach, Rachid Ben Abbou, Fatiha Mrabti
المصدر: Journal of King Saud University: Computer and Information Sciences, Vol 33, Iss 5, Pp 593-599 (2021)
مصطلحات موضوعية: CDH problem, Cloud computing, Integrity checking, Security proof, Simulation remote data auditing, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
10Academic Journal
المؤلفون: Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG
المصدر: Tongxin xuebao, Vol 42, Pp 139-149 (2021)
مصطلحات موضوعية: cloud computing, q-ABDHE security assumption, multi-keyword search, security proof, Telecommunication, TK5101-6720
وصف الملف: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
11Academic Journal
المؤلفون: Shuzhou Sun, Hui Ma, Rui Zhang, Wenhan Xu
المصدر: Cybersecurity, Vol 3, Iss 1, Pp 1-13 (2020)
مصطلحات موضوعية: Identity-based encryption, SM9, Server-aided immediate and robust revocation, Chinese cryptography standard, Security proof, Performance evaluation, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
12Academic Journal
مصطلحات موضوعية: post-quantum cryptography, symmetric encryption scheme, security proof, постквантова криптографія, симетрична шифросистема, NTRUCipher, NTRU Prime, обґрунтування стійкості, 004.056.55:003.26.09
وصف الملف: Pp. 165-176; application/pdf
Relation: Information Technology and Security : Ukrainian research papers collection, 2022, Vol. 10, Iss. 2 (19); Матійко, А. Метод побудови обґрунтовано стійких симетричних NTRU-подібних шифросистем / Матійко Александра Андріївна, Олексійчук Антон Миколайович // Information Technology and Security. – 2022. – Vol. 10, Iss. 2 (19). – Pp. 165–176. – Bibliogr.: 24 ref.; https://ela.kpi.ua/handle/123456789/54616; https://doi.org/10.20535/2411-1031.2022.10.2.270406; orcid:0000-0002-6947-5958; orcid:0000-0003-4385-4631
-
13Academic Journal
المؤلفون: Yasunaga, Kenji
المساهمون: Kenji Yasunaga
مصطلحات موضوعية: Security proof, Hellinger distance, randomness extractor, entropy loss
وصف الملف: application/pdf
Relation: Is Part Of LIPIcs, Volume 199, 2nd Conference on Information-Theoretic Cryptography (ITC 2021); https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITC.2021.17
-
14Academic Journal
المؤلفون: Atsushi KUNII, Goichiro HANAOKA, Junichi OKETANI, Kiyoshi TOMOMURA, SeongHan SHIN, Shimpei KUNII, Shota YAMADA, Yusuke ISHIDA
المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2022, E105.A(8):1121
-
15Report
المساهمون: Sorbonne Université (SU), Cryptologie symétrique, cryptologie fondée sur les codes et information quantique (COSMIQ), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
المصدر: https://inria.hal.science/hal-01661786 ; 2022.
مصطلحات موضوعية: Decoding algorithm, Digital signature scheme, Code-based cryptography, Security proof, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1706.08065v4; hal-01661786; https://inria.hal.science/hal-01661786; https://inria.hal.science/hal-01661786/document; https://inria.hal.science/hal-01661786/file/SURF.pdf; ARXIV: 1706.08065v4
-
16Academic Journal
المؤلفون: Ilya M. Shilov, Danil A. Zakoldaev
المصدر: Naučno-tehničeskij Vestnik Informacionnyh Tehnologij, Mehaniki i Optiki, Vol 21, Iss 2, Pp 249-255 (2021)
مصطلحات موضوعية: blockchain, robust distributed ledger, multidimensional blockchain, universal composability framework, consensus mechanism, transactions, security proof, Optics. Light, QC350-467, Electronic computers. Computer science, QA75.5-76.95
Relation: https://ntv.ifmo.ru/file/article/20340.pdf; https://doaj.org/toc/2226-1494; https://doaj.org/toc/2500-0373; https://doaj.org/article/11ceb7bb5a3146c999c3d9294059dc60
-
17Academic Journal
المؤلفون: Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim
المصدر: IACR Transactions on Symmetric Cryptology, Pp 59-83 (2017)
مصطلحات موضوعية: AES, related-key differential attack, security proof, key schedule, Computer engineering. Computer hardware, TK7885-7895
وصف الملف: electronic resource
-
18Academic Journal
المؤلفون: Koichiro Akiyama, Shuhei Nakamura, Masaru Ito, Noriko Hirata-Kohno
المصدر: International Journal of Mathematics for Industry, Vol 11, Iss 1, Pp 1950003-1-1950003-11 (2019)
مصطلحات موضوعية: key exchange protocol, security proof, nonlinear polynomial equation, multivariate equation, Applied mathematics. Quantitative methods, T57-57.97, Mathematics, QA1-939
وصف الملف: electronic resource
-
19Academic Journal
المؤلفون: Jianhong Zhang, Peirong Ou
المصدر: Sensors; Volume 19; Issue 15; Pages: 3370
مصطلحات موضوعية: data sharing, anonymous broadcast encryption, security proof, secure de-duplication
وصف الملف: application/pdf
Relation: Internet of Things; https://dx.doi.org/10.3390/s19153370
الاتاحة: https://doi.org/10.3390/s19153370
-
20Academic Journal
المؤلفون: Luk Bettale, Jean-Sébastien Coron, Rina Zeitoun
المصدر: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 2 (2018)
مصطلحات موضوعية: Side-channel countermeasure, high-order masking, Boolean to arithmetic conversion, ISW security proof, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
وصف الملف: electronic resource