Results 271 to 280 of about 16,729,036 (330)
Some of the next articles are maybe not open access.
2003
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded ...
openaire +1 more source
Part I: Theory Provable security is an important goal in the design of public-key cryptosystems. For most security properties, it is computational security that has to be considered: an attack scenario describes how adversaries interact with the cryptosystem, trying to attack it; the system can be called secure if adversaries with reasonably bounded ...
openaire +1 more source
Transitioning to a Quantum-Resistant Public Key Infrastructure
IACR Cryptology ePrint Archive, 2017Nina Bindel +3 more
semanticscholar +1 more source
Public Key Authentication and Key Agreement in IoT Devices With Minimal Airtime Consumption
IEEE Embedded Systems Letters, 2017Savio Sciancalepore +3 more
semanticscholar +1 more source
Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys
International Conference on the Theory and Application of Cryptology and Information Security, 2018M. Backes +3 more
semanticscholar +1 more source
The Complexity of Public-Key Cryptography
Tutorials on the Foundations of Cryptography, 2017B. Barak
semanticscholar +1 more source
American Cancer Society guideline for diet and physical activity for cancer prevention
Ca-A Cancer Journal for Clinicians, 2020Cheryl L Rock +2 more
exaly
High-Performance and Lightweight Lattice-Based Public-Key Encryption
IoTPTS@AsiaCCS, 2016J. Buchmann +4 more
semanticscholar +1 more source
Physical activity counseling in primary care: Insights from public health and behavioral economics
Ca-A Cancer Journal for Clinicians, 2017Kerem Shuval +2 more
exaly

