„cryptosystems“
Suchergebnisse
178 Treffer
-
Efficiency and Implementation Security of Code-based Cryptosystems
-
Novel Power Trace Processing Methods for Side-Channel Analysis of Cryptosystems
-
Attacking and Defending Code-based Cryptosystems
-
A McEliece cryptosystem using permutation codes
-
On the security of two IKKR-type code-based cryptosystems
-
Computation, Cryptography, and Network Security
-
Multivariate Public Key Cryptosystems
-
Multivariate Public Key Cryptosystems
-
On the k -th order lfsr sequence with public key cryptosystems
-
A Summary of McEliece-Type Cryptosystems and their Security
-
ON RING-LIKE STRUCTURES RELATED TO SYMMETRIC CRYPTOSYSTEMS
-
An attack on p-adic lattice public-key encryption cryptosystems and signature schemes
-
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem
-
Poly-Dragon: an efficient multivariate public key cryptosystem
-
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
-
Converting pairing-based cryptosystems from composite to prime order setting – A comparative analysis
-
Classes of weak Dembowski–Ostrom polynomials for multivariate quadratic cryptosystems
-
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
-
Quantum key recovery under plaintext-checking attacks on post-quantum cryptosystems
-
A Summary of McEliece-Type Cryptosystems and their Security