Results 141 to 150 of about 159 (153)
Some of the next articles are maybe not open access.
Tight finite-key analysis for quantum cryptography
Nature Communications, 2012Marco Tomamichel +2 more
exaly
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography
ACM Computing Surveys, 2022exaly
High-dimensional intracity quantum cryptography with structured photons
Optica, 2017Alicia Sit +2 more
exaly
Full-field implementation of a perfect eavesdropper on a quantum cryptography system
Nature Communications, 2011Johannes Skaar +2 more
exaly
Practical device-independent quantum cryptography via entropy accumulation
Nature Communications, 2018Rotem Arnon-Friedman +2 more
exaly
DNA origami cryptography for secure communication
Nature Communications, 2019Yinan Zhang, Fei Wang, Jie Chao
exaly
A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2012exaly
Advancements in Isogeny-Based Cryptography: A Mathematical Approach to Post-Quantum Security
2025 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)Abhay Soni +2 more
openaire +1 more source

