Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
11 |
Material Type: Livro
|
![]() |
Public-Key Cryptography - PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IIITang, Qiang ; Teague, VanessaSpringer 2024Sem texto completo |
12 |
Material Type: Livro
|
![]() |
Public-Key Cryptography - PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part IITang, Qiang ; Teague, VanessaSpringer 2024Sem texto completo |
13 |
Material Type: Livro
|
![]() |
Public-Key Cryptography - PKC 2024: 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part ITang, Qiang ; Teague, VanessaCham: Springer International Publishing AG 2024Sem texto completo |
14 |
Material Type: Artigo
|
![]() |
On the Security of a Variant of ElGamal Encryption SchemeRao, Fang-YuIEEE transactions on dependable and secure computing, 2019-07, Vol.16 (4), p.725-728Washington: IEEETexto completo disponível |
15 |
Material Type: Livro
|
![]() |
Quantum Attacks on Public-Key CryptosystemsYan, Song Y.Boston, MA: Springer US 2013Texto completo disponível |
16 |
Material Type: Artigo
|
![]() |
Revocable identity‐based matchmaking encryption in the standard modelJiang, Zhe ; Wang, Xiwen ; Zhang, Kai ; Gong, Junqing ; Chen, Jie ; Qian, HaifengIET information security, 2023-07, Vol.17 (4), p.567-581 [Periódico revisado por pares]Hindawi-IETTexto completo disponível |
17 |
Material Type: Artigo
|
![]() |
General Bootstrapping Approach for RLWE-Based Homomorphic EncryptionKim, Andrey ; Deryabin, Maxim ; Eom, Jieun ; Choi, Rakyong ; Lee, Yongwoo ; Ghang, Whan ; Yoo, DonghoonIEEE transactions on computers, 2024-01, Vol.73 (1), p.86-96 [Periódico revisado por pares]New York: IEEETexto completo disponível |
18 |
Material Type: Artigo
|
![]() |
Identity-Based Encryption with Cloud Revocation Authority and Its ApplicationsTseng, Yuh-Min ; Tsai, Tung-Tso ; Huang, Sen-Shan ; Huang, Chung-PengIEEE transactions on cloud computing, 2018-10, Vol.6 (4), p.1041-1053 [Periódico revisado por pares]Piscataway: IEEE Computer SocietyTexto completo disponível |
19 |
Material Type: Livro
|
![]() |
Asymmetric Cryptography: Primitives and ProtocolsPointcheval, DavidNewark: John Wiley & Sons, Incorporated 2023Sem texto completo |
20 |
Material Type: Artigo
|
![]() |
Improved collusion-resistant unidirectional proxy re-encryption scheme from latticeWang, Xuyang ; Hu, Aiqun ; Fang, HaoIET information security, 2020-05, Vol.14 (3), p.342-351 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |