Výsledky vyhledávání - "Applied cryptography"
-
1
Autoři: Salleras, Xavier
Přispěvatelé: University/Department: Universitat Pompeu Fabra. Departament de Tecnologies de la Informació i les Comunicacions
Thesis Advisors: Daza, Vanesa
Zdroj: TDX (Tesis Doctorals en Xarxa)
Témata: Zk-SNARKs, Bulletproofs, Self-sovereign identity, Decentralized services, Blockchain, Privacy, Applied cryptography, Cybersecurity, Internet of things, Embedded systems, Remote keyless entry, Proves de coneixement zero, Identitat autogovernada, Serveis descentralitzats, Cadena de blocs, Privacitat, Criptografia aplicada, Ciberseguretat, Internet de les coses, Sistemes encastats, Sistemes de control remot
Popis souboru: application/pdf
Přístupová URL adresa: http://hdl.handle.net/10803/687975
-
2
Autoři: a další
Zdroj: Proceedings of the 19th International Conference on Availability, Reliability and Security. :1-8
Témata: IoT, MQT, Performance, Post-Quantum Cryptography, Applied Cryptography, Assessment
Popis souboru: text; application/pdf
Přístupová URL adresa: http://hdl.handle.net/11012/250057
-
3
Autoři: a další
Zdroj: Proceedings of the 19th International Conference on Availability, Reliability and Security
Témata: Authentication, Anonymous Digital Signature, Group Signature, Privacy, Benchmarks, Access Control, Security, Applied Cryptography
Popis souboru: text; application/pdf
Přístupová URL adresa: http://hdl.handle.net/11012/250067
-
4
Autoři:
Zdroj: IEEE Access, Vol 12, Pp 182340-182352 (2024)
Témata: accelerator, CV-X-IF, RISC-V, Accelerator, Applied Cryptography, Post-Quantum Cryptography, Lattice-based codes, Hardware Design, ASIC, lattice-based codes, Electrical engineering. Electronics. Nuclear engineering, applied cryptography, post-quantum cryptography, TK1-9971
Popis souboru: application/pdf
-
5
Autoři:
Přispěvatelé:
Zdroj: Proceedings of the ACM Asia Conference on Computer and Communications Security. :286-299
Témata: Time-Memory Trade-Offs, Rainbow Tables, Password Cracking, Applied Cryptography Time-Memory Trade-Offs Password Cracking Rainbow Tables, Applied Cryptography, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Popis souboru: application/pdf
-
6
Autoři: Sheybani, Nojan
Témata: Computer engineering, Computer science, Information technology, Applied Cryptography, Privacy-Preserving Computation
Popis souboru: application/pdf
-
7
Autoři:
Zdroj: IEEE Access, Vol 13, Pp 151137-151152 (2025)
Témata: Applied cryptography, and alpha composition, and blockchain, and content protection, and encryption, and decryption, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
Popis souboru: electronic resource
Přístupová URL adresa: https://doaj.org/article/a4fffd41aad14fa38058099c5eb31f8f
-
8
Autoři: a další
Přispěvatelé: a další
Témata: IoT Security, Cryptography, Side channel attacks, Embedded systems security, Applied cryptography
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-3-031-89062-8; info:eu-repo/semantics/altIdentifier/isbn/978-3-031-89065-9; info:eu-repo/semantics/altIdentifier/isbn/978-3-031-89063-5; ispartofbook:The 22nd International Conference on Information Technology-New Generations (ITNG 2025); 22nd International Conference on Information Technology-New Generations (ITNG 2025); volume:1463; firstpage:71; lastpage:83; numberofpages:13; serie:ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING; alleditors:Shahram Latifi; https://hdl.handle.net/11311/1289747
-
9
Autoři: a další
Přispěvatelé: a další
Popis souboru: STAMPA
Relation: info:eu-repo/semantics/altIdentifier/isbn/978-3-031-79006-5; info:eu-repo/semantics/altIdentifier/wos/WOS:001446544900006; ispartofbook:Secure IT Systems. NordSec 2024; The 29th Nordic Conference on Secure IT Systems, NordSec 2024; volume:15396; firstpage:101; lastpage:120; numberofpages:20; serie:LECTURE NOTES IN COMPUTER SCIENCE; alleditors:Leonardo Horn Iwaya, Liina Kamm, Leonardo Martucci, Tobias Pulls; https://hdl.handle.net/11311/1278098
-
10
Autoři: a další
Zdroj: Proceedings of the 18th International Conference on Availability, Reliability and Security (ARES ’23)
Proceedings of the 18th International Conference on Availability, Reliability and SecurityTémata: Authentication, Anonymous Digital Signature, Group Signature, Privacy, Benchmarks, Security, 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, Access control, 02 engineering and technology, Applied Cryptography
Popis souboru: text; application/pdf
Přístupová URL adresa: http://hdl.handle.net/11012/245032
-
11
Autoři: a další
Zdroj: Proceedings of the 18th International Conference on Availability, Reliability and Security. :1-10
Témata: 0301 basic medicine, 03 medical and health sciences, Performance, Post-Quantum Cryptography, Security Recommendations, 0202 electrical engineering, electronic engineering, information engineering, Security Protocols, 02 engineering and technology, Applied Cryptography, Assessment
Popis souboru: text; application/pdf
Přístupová URL adresa: http://hdl.handle.net/11012/245031
-
12
Autoři:
Zdroj: 2023 IEEE 24th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). :407-412
Témata: Critical Infrastructure, Performance Evaluation, Cybersecurity, Applied Cryptography, Wireless Security, LDACS, Aeronautical Communications
Přístupová URL adresa: https://elib.dlr.de/194185/
https://doi.org/10.1109/wowmom57956.2023.00072 -
13
Autoři:
Zdroj: Cybersecurity, Vol 7, Iss 1, Pp 1-15 (2024)
Témata: Encrypted database, Frequency-smoothing encryption, Inference attacks, Applied cryptography, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
Popis souboru: electronic resource
Relation: https://doaj.org/toc/2523-3246
Přístupová URL adresa: https://doaj.org/article/acd2a02831c14d2da1ab247c4f305224
-
14
Autoři: Sanders, Olivier
Přispěvatelé: Sanders, Olivier
Zdroj: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security. :1126-1138
Témata: 0202 electrical engineering, electronic engineering, information engineering, applied cryptography anonymous authentication EPID, 02 engineering and technology, applied cryptography, [INFO] Computer Science [cs], anonymous authentication, EPID
Popis souboru: application/pdf
-
15
Autoři: a další
Zdroj: IEEE Access, Vol 11, Pp 62955-62969 (2023)
Témata: Anonymous broadcast authentication, remote control system, Electrical engineering. Electronics. Nuclear engineering, applied cryptography, provable security, message authentication codes, TK1-9971
Přístupová URL adresa: https://doaj.org/article/43ef327aa79b4f8484e3aed2df19c59c
-
16
Autoři: a další
Zdroj: IEEE Access, Vol 11, Pp 3338-3351 (2023)
Témata: Number theoretic transform, accelerator, 0202 electrical engineering, electronic engineering, information engineering, convolution, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, polynomial product, applied cryptography, post-quantum cryptography, QC-MDPC codes, hardware design, ASIC, FPGA, TK1-9971
Popis souboru: application/pdf
-
17
Autoři: a další
Zdroj: Albrecht, M, Mareková, L, Paterson, K G & Stepanovs, I 2025, 'Four Attacks and a Proof for Telegram', Journal of Cryptology.
2022 IEEE Symposium on Security and Privacy (SP)Témata: Applied cryptography, Protocol security, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Popis souboru: application/pdf; application/application/pdf
-
18
Autoři:
Přispěvatelé:
Zdroj: Proceedings of the 15th International Joint Conference on Biomedical Engineering Systems and Technologies. :821-831
Témata: Computer science [C05] [Engineering, computing & technology], 0301 basic medicine, 03 medical and health sciences, privacy-preserving genomic data processing, copy number variation, applied cryptography, Sciences informatiques [C05] [Ingénierie, informatique & technologie], 3. Good health
Přístupová URL adresa: http://orbilu.uni.lu/handle/10993/49487
-
19
Autoři:
Zdroj: IEEE Access, Vol 9, Pp 69210-69225 (2021)
Témata: Applied cryptography, side channel attacks, code morphing, 0202 electrical engineering, electronic engineering, information engineering, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, power consumption attack countermeasures, Applied cryptography , code morphing , computer security , side channel attacks , power consumption attack countermeasures, computer security, TK1-9971
Popis souboru: application/pdf
Přístupová URL adresa: https://doaj.org/article/ede50e77365e484f8a94396c69c9357d
-
20
Autoři: a další
Zdroj: IEEE Access, Vol 9, Pp 66223-66240 (2021)
Témata: bit-flipping decoding, General Computer Science, ASIC, General Engineering, 02 engineering and technology, post-quantum cryptography, TK1-9971, Decoding, Cryptography, NIST, Field programmable gate arrays, Error correction codes, Elliptic curve cryptography ,Hardware, Applied cryptography, post-quantum cryptography, hardware design, ASIC, FPGA, bit-flipping decoding, LDPC codes, Applied cryptography, hardware design, 0202 electrical engineering, electronic engineering, information engineering, General Materials Science, Electrical engineering. Electronics. Nuclear engineering, FPGA
Popis souboru: application/pdf
Přístupová URL adresa: https://doaj.org/article/c53e2a40b3a84db68832a37ea18b36d6
https://ieeexplore.ieee.org/document/9417170
https://dblp.uni-trier.de/db/journals/access/access9.html#KoleciSBCMM21
https://doi.org/10.1109/ACCESS.2021.3076245
https://iris.polito.it/handle/11583/2898432
https://ieeexplore.ieee.org/document/9417170
https://doi.org/10.1109/ACCESS.2021.3076245
https://hdl.handle.net/11583/2898432
https://www.openaccessrepository.it/record/142503
Nájsť tento článok vo Web of Science
Full Text Finder