Results 151 to 160 of about 3,550 (163)
Some of the next articles are maybe not open access.
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Nature Communications, 2011Johannes Skaar +2 more
exaly
Practical device-independent quantum cryptography via entropy accumulation
Nature Communications, 2018Rotem Arnon-Friedman +2 more
exaly
DNA origami cryptography for secure communication
Nature Communications, 2019Yinan Zhang, Fei Wang, Jie Chao
exaly
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly
Solution-processed memristors: performance and reliability
Nature Reviews MaterialsSebastián Matías Pazos +2 more
exaly
Session details: Code-based and Elliptic Curve Cryptography
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018openaire +1 more source

