Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
Guest Editorial: Selected Papers from 17th International Conference on Cryptology and Network Security (CANS)IET information security, 2020-05, Vol.14 (3), p.253-253 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Guest Editorial: Selected Papers from the 15th International Conference on Cryptology and Network Security (CANS 2016)IET information security, 2018-07, Vol.12 (4), p.247-247 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Impact of the modulus switching technique on some attacks against learning problemsLe, Huy Quoc ; Mishra, Pradeep Kumar ; Nakamura, Satoshi ; Kinjo, Koha ; Duong, Dung Hoang ; Yasuda, MasayaIET information security, 2020-05, Vol.14 (3), p.286-303 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Faster privacy-preserving location proximity schemes for circles and polygonsJärvinen, Kimmo ; Kiss, Ágnes ; Schneider, Thomas ; Tkachenko, Oleksandr ; Yang, ZhengIET information security, 2020-05, Vol.14 (3), p.254-265 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC projectLiu, Zhen ; Pan, Yanbin ; Xie, TianyuanIET information security, 2020-05, Vol.14 (3), p.313-320 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Fully invisible protean signatures schemesKrenn, Stephan ; Pöhls, Henrich C ; Samelin, Kai ; Slamanig, DanielIET information security, 2020-05, Vol.14 (3), p.266-285 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Complexity of statistical attacks on QC-LDPC code-based cryptosystemsSantini, Paolo ; Baldi, Marco ; Chiaraluce, FrancoIET information security, 2020-05, Vol.14 (3), p.304-312 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Power of public-key function-private functional encryptionIovino, Vincenzo ; Tang, Qiang ; Żebrowski, KarolIET information security, 2018-07, Vol.12 (4), p.248-256 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
9 |
Material Type: Artigo
|
![]() |
Sandwich construction for keyed sponges: independence between capacity and construction queriesNaito, YusukeIET information security, 2018-07, Vol.12 (4), p.265-274 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Analysing HSTS and HPKP implementation in both browsers and serversDe los Santos, Sergio ; Torres, JoséIET information security, 2018-07, Vol.12 (4), p.275-284 [Periódico revisado por pares]The Institution of Engineering and TechnologyTexto completo disponível |