Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Jakob Funder"'
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science ISBN: 9783319042671
ICITS
Lecture Notes in Computer Science ISBN: 9783319042671
ICITS
Attacks on cryptographic protocols are usually modeled by allowing an adversary to ask queries to an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve,
Autor:
ZHANDRY, MARK1 mzhandry@gmail.com
Publikováno v:
Journal of the ACM. Sep2021, Vol. 68 Issue 5, p1-43. 43p.
Autor:
Senapati, Debabrata, Bhattacharya, Manojit, Kar, Avijit, Chini, Deep Sankar, Das, Basanta Kumar, Patra, Bidhan Chandra
Publikováno v:
Proceedings of the Zoological Society; Sep2019, Vol. 72 Issue 3, p211-228, 18p
Publikováno v:
Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings; 2014, pI-XII, 12p
Autor:
Damgård, Ivan Bjerre
Publikováno v:
Damgård, I B 2011, ' Quantum Communication Attacks on Classical Cryptographic Protocols ' 5th International Conference on Information Theoretic Security, Amsterdam, Netherlands, 21/05/2011-24/05/2011, . https://doi.org/10.1007/978-3-642-20728-0_16
In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates clas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::21c8c79c4be4549dc9e9aad95b0772e3
https://pure.au.dk/portal/da/publications/quantum-communication-attacks-on-classical-cryptographic-protocols(d0c2f647-4ef9-4cf2-93ef-217f03639c44).html
https://pure.au.dk/portal/da/publications/quantum-communication-attacks-on-classical-cryptographic-protocols(d0c2f647-4ef9-4cf2-93ef-217f03639c44).html
Autor:
Ivan Damgård
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642207273
In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates clas
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5335ed440419327b7b1c93994656685c
https://doi.org/10.1007/978-3-642-20728-0_16
https://doi.org/10.1007/978-3-642-20728-0_16
Publikováno v:
Advances in Cryptology - ASIACRYPT 2011; 2011, p1-1, 1p
Publikováno v:
Topics in Cryptology - Ct-rsa 2009; 2009, p1-1, 1p
Autor:
Carles Padró
This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissio
Autor:
Ronald Cramer
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submi