Results 71 to 80 of about 2,293 (163)

Security Analysis of DBTRU Cryptosystem. [PDF]

open access: yesEntropy (Basel), 2022
Tong X, Bi J, Duan Y, Li L, Wang L.
europepmc   +1 more source

Testing isomorphism of lattices over CM-orders

open access: yes, 2019
A CM-order is a reduced order equipped with an involution that mimics complex conjugation. The Witt-Picard group of such an order is a certain group of ideal classes that is closely related to the "minus part" of the class group.
Lenstra Jr., Hendrik W.   +1 more
core  

Post-Quantum Security: Opportunities and Challenges. [PDF]

open access: yesSensors (Basel), 2023
Li S   +7 more
europepmc   +1 more source

Pathways to the co-management of protected areas and native title in Australia [PDF]

open access: yes
In recent decades, various forms of co-management of national parks and other protected areas by governments and Indigenous people have come to the fore.
Chris Haynes   +2 more
core  

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Farooq S   +6 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy