Results 101 to 110 of about 9,817 (168)

A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]

open access: yesEPJ Quantum Technol
Aquina N   +9 more
europepmc   +1 more source

Continuous-variable protocol for oblivious transfer in the noisy-storage model. [PDF]

open access: yesNat Commun, 2018
Furrer F   +5 more
europepmc   +1 more source

Computational challenges and solutions: Prime number generation for enhanced data security. [PDF]

open access: yesPLoS One
Ezz-Eldien A   +6 more
europepmc   +1 more source

Towards practical privacy-preserving genome-wide association study. [PDF]

open access: yesBMC Bioinformatics, 2018
Bonte C   +5 more
europepmc   +1 more source

(Inner-Product) Functional Encryption with Updatable Ciphertexts. [PDF]

open access: yesJ Cryptol
Cini V   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy