Results 181 to 190 of about 94,493 (210)
Some of the next articles are maybe not open access.

Beyond-Birthday-Bound Security with HCTR2: Cascaded Construction and Tweak-Based Key Derivation

International Conference on the Theory and Application of Cryptology and Information Security
Yu Long Chen   +5 more
semanticscholar   +1 more source

Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication

The Cryptographer's Track at RSA Conference, 2015
Yusi Zhang
semanticscholar   +1 more source

Nano-enabled pesticides for sustainable agriculture and global food security

Nature Nanotechnology, 2022
Deng-jun Wang, Navid B Saleh, Kay T Ho
exaly  

Minimizing beyond-birthday-bound secure permutation-based pseudorandom function

Discrete Mathematics
Ping Zhang   +4 more
openaire   +1 more source

Circularly polarized lanthanide luminescence for advanced security inks

Nature Reviews Chemistry, 2020
Lewis Edward MacKenzie, Robert Pal
exaly  

Authenticated Encryption Mode for Beyond the Birthday Bound Security

International Conference on Cryptology in Africa, 2008
Tetsu Iwata
semanticscholar   +1 more source

A Survey on Security Aspects for 3GPP 5G Networks

IEEE Communications Surveys and Tutorials, 2020
Jin Cao, Maod, Hui Li
exaly  

Classifications and Applications of Physical Layer Security Techniques for Confidentiality: A Comprehensive Survey

IEEE Communications Surveys and Tutorials, 2019
Jehad M Hamamreh   +2 more
exaly  

Home - About - Disclaimer - Privacy