Results 131 to 140 of about 4,998 (181)

Secure computation protocol of Chebyshev distance under the malicious model. [PDF]

open access: yesSci Rep
Liu X   +7 more
europepmc   +1 more source

NTRU Modulo p Flaw

open access: yesInternational Journal for Information Security Research, 2016
Anas Ibrahim, Alexander Chefranov
openaire   +1 more source

Home - About - Disclaimer - Privacy