E-Books durchsuchen
Mathematical Modelling for Next-Generation Cryptography [2017]
- 1
-
Introduction to CREST Crypto-Math Project
- 17
-
Multivariate Public Key Cryptosystems
- 43
-
Code-Based Zero-Knowledge Protocols and Their Applications
- 63
-
Hash Functions Based on Ramanujan Graphs
- 81
-
Pairings on Hyperelliptic Curves with Considering Recent Progress on the NFS Algorithms
- 97
-
Efficient Algorithms for Isogeny Sequences and Their Cryptographic Applications
- 117
-
Spectral Degeneracies in the Asymmetric Quantum Rabi Model
- 139
-
Spectra of Group-Subgroup Pair Graphs
- 159
-
Ramanujan Cayley Graphs of the Generalized Quaternion Groups and the Hardy–Littlewood Conjecture
- 177
-
Uniform Random Number Generation and Secret Key Agreement for General Sources by Using Sparse Matrices
- 199
-
Mathematical Approach for Recovering Secret Key from Its Noisy Version
- 221
-
Simple Analysis of Key Recovery Attack Against LWE
- 239
-
A Mixed Integer Quadratic Formulation for the Shortest Vector Problem
- 257
-
On Analysis of Recovering Short Generator Problems via Upper and Lower Bounds of Dirichlet <Emphasis Type="Italic">L</Emphasis>-Functions: Part 1
- 279
-
On Analysis of Recovering Short Generator Problems via Upper and Lower Bounds of Dirichlet <Emphasis Type="Italic">L</Emphasis>-functions: Part 2
- 297
-
Recent Progress on Coppersmith’s Lattice-Based Method: A Survey
- 315
-
How to Strengthen the Security of Signature Schemes in the Leakage Models: A Survey
- 331
-
Constructions for the IND-CCA1 Secure Fully Homomorphic Encryption
- 349
-
A Survey on Identity-Based Encryption from Lattices