Suchergebnisse - "Code-based cryptography"
-
1
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 2025 IEEE 38th Computer Security Foundations Symposium (CSF). :441-456
Schlagwörter: Zero-knowledge Proofs, code-based cryptography, formal verification, EasyCrypt, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
Zugangs-URL: https://inria.hal.science/hal-04856221v1
-
2
Autoren: et al.
Weitere Verfasser: et al.
Quelle: UPCommons. Portal del coneixement obert de la UPC
Universitat Politècnica de Catalunya (UPC)Schlagwörter: Public key cryptosystem, Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia, Post-quantum cryptosystems, Code-based cryptography, Security and privacy, Theory of computation
Dateibeschreibung: application/pdf
-
3
Autoren:
Quelle: World Journal of Advanced Research and Reviews. 25:1916-1924
-
4
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Designs, Codes and Cryptography. 92:4511-4530
Schlagwörter: NIST Mathematics Subject Classification 94A60, Public-key encryption, Post-quantum cryptography, HQC, [INFO]Computer Science [cs], Post-quantum cryptography Code-based cryptography Public-key encryption HQC NIST Mathematics Subject Classification 94A60 11T71 14G50, 11T71, Code-based cryptography, 14G50
-
5
Autoren:
Quelle: Discover Computing, Vol 28, Iss 1, Pp 1-31 (2025)
Schlagwörter: Post-quantum cryptography (PQC), Code-Based Cryptography, Hybrid Cryptographic Framework, SSL/TLS Protocols, Quantum-Resistant Communication, Quantum Random Number Generators (QRNGs), Electronic computers. Computer science, QA75.5-76.95
Dateibeschreibung: electronic resource
Relation: https://doaj.org/toc/2948-2992
-
6
Autoren: et al.
Quelle: Engineering and Technology Journal. 10
-
7
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
-
8
Autoren:
Quelle: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 1 (2024)
-
9
Autoren: et al.
Weitere Verfasser: et al.
Quelle: IACR Communications in Cryptology. 2
-
10
Autoren:
Weitere Verfasser:
Schlagwörter: FOS: Computer and information sciences, Post-quantum cryptography, Cryptography and Security, Latticebased cryptography, Compressed GPV, Digital Signatures, Cryptography and Security (cs.CR), Code-based cryptography, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
-
11
Autoren: et al.
Weitere Verfasser: et al.
Quelle: Lecture Notes in Computer Science ISBN: 9783032019004
Schlagwörter: Post-quantum cryptography, Side-channel attacks, Code-based cryptography, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Dateibeschreibung: application/pdf
Zugangs-URL: https://laas.hal.science/hal-05157145v1
-
12
Autoren:
Quelle: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 4 (2025)
Schlagwörter: Code-based cryptography, Side-channel attacks, HQC, Plaintext-checking oracle, Computer engineering. Computer hardware, TK7885-7895, Information technology, T58.5-58.64
Dateibeschreibung: electronic resource
-
13
Autoren:
Quelle: 2023 30th IEEE International Conference on Electronics, Circuits and Systems (ICECS). :1-4
Dateibeschreibung: application/pdf
-
14
Autoren: et al.
Weitere Verfasser: et al.
Quelle: IEEE Transactions on Information Theory. 70:2271-2286
Schlagwörter: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Encryption, 0102 computer and information sciences, 02 engineering and technology, [INFO] Computer Science [cs], 01 natural sciences, 0202 electrical engineering, electronic engineering, information engineering, Rank Metric, [INFO]Computer Science [cs], Gabidulin Codes, Code-Based Cryptography, Cryptography and Security (cs.CR)
Dateibeschreibung: application/pdf
-
15
Autoren: et al.
Weitere Verfasser: et al.
Quelle: International Symposium on Information Theory (ISIT) ; https://hal.science/hal-04894873 ; International Symposium on Information Theory (ISIT), Jun 2025, Ann Arbor (Michigan), United States
Schlagwörter: Post-quantum cryptosystems, rank metric code, Code based cryptography, [MATH]Mathematics [math]
Geographisches Schlagwort: Ann Arbor (Michigan), United States
-
16
Autoren:
Dateibeschreibung: application/pdf
-
17
Autoren:
Schlagwörter: post-quantum cryptography, code-based cryptography, ddc
Dateibeschreibung: application/pdf
Zugangs-URL: https://mediatum.ub.tum.de/doc/1833570/document.pdf
-
18
Autoren:
Quelle: Cryptography, Vol 9, Iss 3, p 53 (2025)
Schlagwörter: post-quantum cryptography, code-based cryptography, identity-based cryptography, identification, signatures, wave, Technology
Dateibeschreibung: electronic resource
-
19
Autoren: et al.
Schlagwörter: info:eu-repo/classification/ddc, Article, Code-based cryptography, Side-channel attacks, Classic McEliece, Information set decoding, 94A60, 94B05, 68Q25
Dateibeschreibung: application/pdf
-
20
Autoren: et al.
Weitere Verfasser: et al.
Quelle: ISSN: 3006-5496 ; IACR Communications in Cryptology ; https://hal.science/hal-05283096 ; IACR Communications in Cryptology, 2025, 2 (2), ⟨10.62056/AHMPGYL7S⟩.
Schlagwörter: Classic McEliece, Code-based cryptography, Post-quantum cryptography, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Nájsť tento článok vo Web of Science
Full Text Finder