Search Results - "Code Based Cryptography"
-
1
Authors: et al.
Source: IEEE Internet of Things Journal. 12:36318-36327
-
2
Authors: et al.
Contributors: et al.
Source: 2025 Design, Automation & Test in Europe Conference (DATE). :1-7
Subject Terms: [INFO.INFO-AR] Computer Science [cs]/Hardware Architecture [cs.AR], Instruction sets, Europe, NIST, Hardware, Cryptography, Field programmable gate arrays, Standards, Optimization, RISC-V, CV-X-IF, HQC, FPGA, PQC, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
File Description: application/pdf
-
3
Authors:
Source: Journal of Discrete Mathematical Sciences and Cryptography. 28:959-972
-
4
Authors: et al.
Contributors: et al.
Source: Series of licentiate and doctoral theses. (186)
Subject Terms: Natural Sciences, Computer and Information Sciences, Computer Sciences, Naturvetenskap, Data- och informationsvetenskap (Datateknik), Datavetenskap (Datalogi)
File Description: electronic
-
5
Authors:
Source: Procedia Computer Science. 259:1034-1048
-
6
Authors: et al.
Source: Jurnal Teknik Indonesia. 3:49-53
-
7
Authors: et al.
Source: Jurnal Teknik Indonesia. 3:61-67
-
8
Authors: Gassner, Niklas
Source: Gassner, Niklas. Codes over Rings, Their Generic Decoding and Their Use in Code-Based Cryptography. 2025, University of Zurich, Faculty of Science.
-
9
Source: Lecture Notes in Computer Science ISBN: 9783031902284
-
10
Authors:
Index Terms: info:eu-repo/semantics/other
URL:
https://ir.cwi.nl/pub/35231
info:eu-repo/grantAgreement/NWO/024.003.037/3368 -
11
-
12
Authors:
Source: IEEE Open Journal of the Communications Society, Vol 3, Pp 1528-1539 (2022)
Subject Terms: generalized concatenated codes, Telecommunication, 0202 electrical engineering, electronic engineering, information engineering, restricted error values, TK5101-6720, 02 engineering and technology, Transportation and communications, Code-based cryptography, public-key cryptography, McEliece cryptosystem, HE1-9990
File Description: application/pdf
-
13
Authors:
Source: 2024 International Conference on Science Technology Engineering and Management (ICSTEM). :1-5
-
14
Authors:
Source: 2024 25th International Symposium on Quality Electronic Design (ISQED). :1-8
-
15
Authors:
Source: Advances in Information Security, Privacy, and Ethics ISBN: 9798369392201
-
16
Authors: et al.
Contributors: et al.
Source: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES) Decryption Failure Attacks on Post-Quantum Cryptography. 2019(1):238-258
Subject Terms: Engineering and Technology, Electrical Engineering, Electronic Engineering, Information Engineering, Computer Systems, Teknik, Elektroteknik och elektronik, Datorsystem
Access URL: https://doi.org/10.13154/tches.v2019.i1.238-258
-
17
Authors:
Subject Terms: FOS: Computer and information sciences, Cryptography and Security, Information Theory (cs.IT), Information Theory, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2507.01118
-
18
Authors:
Source: Prikladnaya Diskretnaya Matematika. :84-109
-
19
-
20
Authors:
Resource Type: eBook.
Subjects: Computer network architectures--Congresses, Coding theory--Congresses, Data encryption (Computer science)--Congresses
Categories: COMPUTERS / Security / Cryptography & Encryption
Full Text Finder
Nájsť tento článok vo Web of Science