Results 71 to 80 of about 241 (86)

Analysing and exploiting the Mantin biases in RC4. [PDF]

open access: yesDes Codes Cryptogr, 2018
Bricout R   +3 more
europepmc   +1 more source

Finding shortest lattice vectors faster using quantum search. [PDF]

open access: yesDes Codes Cryptogr, 2015
Laarhoven T, Mosca M, van de Pol J.
europepmc   +1 more source

Quantum cryptography beyond quantum key distribution. [PDF]

open access: yesDes Codes Cryptogr, 2016
Broadbent A, Schaffner C.
europepmc   +1 more source

Guessing less and better: improved attacks on GIFT-64. [PDF]

open access: yesDes Codes Cryptogr
Canale F, Naya-Plasencia M.
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

Semiring Actions for Public Key Cryptography

Journal of Computer and Mathematical Sciences, 2019
In this paper we give a protocol for public key sharing and encryption and decryption of plaintext using semiring action problem which is a generalization of discrete logarithmic problem. AMS Classification: 16Y60, 11T71, 14G50, 94A60.
S. Nivetha   +2 more
semanticscholar   +1 more source

Advanced threshold signature schemes leveraging isogeny-based cryptography

Global Journal of Engineering and Technology Advances
This paper investigates the use of threshold signature schemes in isogeny-based cryptosystems. By leveraging the distinct features of isogeny graphs, we propose a protocol that offers high security and practical efficiency, making it ideal for ...
Mohammed El Baraka, Siham Ezzouak
semanticscholar   +1 more source

Optimizations for NTRU

, 2001
J. Hoffstein, J. Silverman
semanticscholar   +1 more source

Novel Zaslavsky Map Based Pseudorandom Bit Generation Scheme

, 2014
B. Stoyanov   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy