Erscheinungsjahr
Medientyp
Fach
Format
Lizenz
Sprache
Synonyme wurden verwendet für: Geheimschrift
Suche ohne Synonyme: keywords:(Geheimschrift)
Verwendete Synonyme:
- cryptography
-
Designing Efficient Dyadic Operations for Cryptographic Applications
Freier ZugriffDOAJ | 2020|Schlagwörter: post-quantum cryptography, code-based cryptography -
DAGS: Key encapsulation using dyadic GS codes
Freier ZugriffDOAJ | 2018|Schlagwörter: post-quantum cryptography, code-based cryptography -
Random Organic Nanolaser Arrays for Cryptographic Primitives
Wiley | 2019|Schlagwörter: cryptography -
Compressive Imaging Encryption with Secret Sharing Metasurfaces
Wiley | 2022|Schlagwörter: visual cryptography -
Information Coding in a Reconfigurable DNA Origami Domino Array
Wiley | 2020|Schlagwörter: cryptography -
Estimation of the hardness of the learning with errors problem with a restricted number of samples
Freier ZugriffDOAJ | 2019|Schlagwörter: lattice-based cryptography, post-quantum cryptography -
Hash functions from superspecial genus-2 curves using Richelot isogenies
Freier ZugriffDOAJ | 2020|Schlagwörter: cryptography -
Compact McEliece keys based on quasi-dyadic Srivastava codes
Freier ZugriffDOAJ | 2012|Schlagwörter: cryptography -
Short Principal Ideal Problem in multicubic fields
Freier ZugriffDOAJ | 2020|Schlagwörter: public-key cryptography, post-quantum cryptography -
Length-based cryptanalysis: the case of Thompson's group
Freier ZugriffDOAJ | 2007|Schlagwörter: noncommutative cryptography, combinatorial group theory and cryptography -
Experimental Implementation of Metasurfaces for Secure Multi‐Channel Image Encryption in the Infrared
Wiley | 2023|Schlagwörter: cryptography -
Flexible Plasmonic Metasurfaces with User‐Designed Patterns for Molecular Sensing and Cryptography
Wiley | 2016|Schlagwörter: cryptography -
Hybrid State Engineering of Phase‐Change Metasurface for All‐Optical Cryptography
Wiley | 2021|Schlagwörter: optical cryptography -
Cryptanalysing variants of Stickel's key agreement scheme
Freier ZugriffDOAJ | 2011|Schlagwörter: group-based cryptography -
On the concrete hardness of Learning with Errors
Freier ZugriffDOAJ | 2015|Schlagwörter: lattice-based cryptography -
Dynamic Cryptography through Plasmon‐Enhanced Fluorescence Blinking
Wiley | 2022|Schlagwörter: dynamic cryptography -
A Summary of McEliece-Type Cryptosystems and their Security
Freier ZugriffDOAJ | 2007|Schlagwörter: public key cryptography,, code based cryptography, -
Families of elliptic curves with rational 3-torsion
Freier ZugriffDOAJ | 2012|Schlagwörter: cryptography -
An essay on the art of decyphering. In which is inserted a discourse of Dr. Wallis. Now first publish'd from his original manuscript in the publick library at Oxford. By John Davys, M. A. Rector of Castle-Ashby in Northamptonshire
NationallizenzGWLB - Gottfried Wilhelm Leibniz Bibliothek | 1737|Schlagwörter: Cryptography -
Peptide-Based Sensing, Logic Computing, and Information Security on the Antimonene Platform
American Chemical Society | 2022|Schlagwörter: peptide cryptography -
Super-Optimal Pairings
NationallizenzTrans Tech Publications | 2013|Schlagwörter: Pairing-Based Cryptography -
Analysis of a key exchange protocol based on tropical matrix algebra
Freier ZugriffDOAJ | 2018|Schlagwörter: cryptography -
Hybrid approach for solving multivariate systems over finite fields
Freier ZugriffDOAJ | 2009|Schlagwörter: multivariate cryptography -
New approach to practical leakage-resilient public-key cryptography
Freier ZugriffDOAJ | 2020|Schlagwörter: leakage-resilient cryptography, public-key cryptography -
Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme
Freier ZugriffDOAJ | 2015|Schlagwörter: symmetric key cryptography -
Heuristics on pairing-friendly elliptic curves
Freier ZugriffDOAJ | 2012|Schlagwörter: pairing-based cryptography -
On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in ℚ(𝜁2𝑠)
Freier ZugriffDOAJ | 2019|Schlagwörter: lattice-based cryptography -
Security Analysis of Square Minus Scheme
NationallizenzTrans Tech Publications | 2013|Schlagwörter: Public Key Cryptography -
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
Freier ZugriffDOAJ | 2020|Schlagwörter: isogeny-based cryptography -
On the ρ-values of complete families of pairing-friendly elliptic curves
Freier ZugriffDOAJ | 2012|Schlagwörter: pairing-based cryptography -
On a conjecture for balanced symmetric Boolean functions
Freier ZugriffDOAJ | 2009|Schlagwörter: cryptography -
Aperiodic logarithmic signatures
Freier ZugriffDOAJ | 2012|Schlagwörter: group theoretic cryptography -
Factor-4 and 6 compression of cyclotomic subgroups of and
Freier ZugriffDOAJ | 2010|Schlagwörter: pairing-based cryptography -
Cryptanalysis of the MST3 public key cryptosystem
Freier ZugriffDOAJ | 2009|Schlagwörter: group theoretic cryptography -
A family of weak keys in HFE and the corresponding practical key-recovery
Freier ZugriffDOAJ | 2012|Schlagwörter: multivariate cryptography -
New Techniques for SIDH-based NIKE
Freier ZugriffDOAJ | 2020|Schlagwörter: isogeny-based cryptography -
Algebraic generalization of Diffie–Hellman key exchange
Freier ZugriffDOAJ | 2018|Schlagwörter: cryptography -
Conventional Non‐Fluorescent Polymers: Unconventional Security Inks for Data Storage and Multidimensional Photonic Cryptography
Wiley | 2023|Schlagwörter: photonic cryptography -
The power of primes: security of authentication based on a universal hash-function family
Freier ZugriffDOAJ | 2010|Schlagwörter: cryptography -
Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions
Freier ZugriffDeGruyter | 2021|Schlagwörter: cryptography -
Self-pairings on hyperelliptic curves
Freier ZugriffDOAJ | 2013|Schlagwörter: pairing based cryptography -
On the leakage-resilient key exchange
Freier ZugriffDOAJ | 2017|Schlagwörter: leakage-resilient cryptography -
Using Inclusion / Exclusion to find Bent and Balanced Monomial Rotation Symmetric Functions
Freier ZugriffDOAJ | 2021|Schlagwörter: cryptography -
A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack
Freier ZugriffDOAJ | 2019|Schlagwörter: lattice-based cryptography -
On hashing into elliptic curves
Freier ZugriffDOAJ | 2009|Schlagwörter: elliptic curve cryptography -
An attack on disguised elliptic curves
Freier ZugriffDOAJ | 2008|Schlagwörter: public key cryptography
Meine Suche schicken an (beta)
Schicken Sie ihre Suchanfrage (Suchterm ohne Filter) an andere Datenbanken, Portale und Kataloge, um ggf. weitere interessante Treffer zu finden:
Dimensions ist eine Datenbank für Abstracts und Zitate, die Informationen zu Forschungsförderungen mit daraus resultierenden Veröffentlichungen, Studien und Patenten verknüpft.
Im TIB AV-Portal können audiovisuelle Medien aus Wissenschaft und Lehre recherchiert und eigene wissenschaftliche Videos publiziert werden.
Im FID move kann nach fachspezifischer Literatur, Forschungsdaten und weitere Informationen aus der Mobilitäts- und Verkehrsforschung gesucht werden.
Der Open Research Knowledge Graph liefert strukturiert beschriebene Forschungsinhalte und macht diese vergleichbar.
Frei zugänglicher Ausschnitt der Verbunddatenbank K10plus des GBV und des SWB mit für die Fernleihe und Direktlieferdienste relevanten Materialien.