Zobrazeno 1 - 10
of 51
pro vyhledávání: '"crytography"'
Publikováno v:
Journal of Engineering Technology and Applied Physics, Vol 4, Iss 1, Pp 16-24 (2022)
Discussions regarding 5G mobile wireless networks frequently involve the impact they will create to our daily lives. Some view 5G as a disruption while some are questioning the need to deploy the network when conventional mobile networks are still pe
Externí odkaz:
https://doaj.org/article/ebab8bc5847b4941b42c9a3d74bfa270
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 5, Iss 6, Pp 1113-1119 (2021)
One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonl
Externí odkaz:
https://doaj.org/article/1d384dd9629147b78ed1a832e8b0154b
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 5, Iss 6, Pp 1113-1119 (2021)
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi); Vol 5 No 6 (2021): Desember 2021; 1113-1119
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi); Vol 5 No 6 (2021): Desember 2021; 1113-1119
One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonl
Autor:
Yixin Shen
Publikováno v:
HAL
Cryptography and Security [cs.CR]. Université de Paris, 2021. English
Cryptography and Security [cs.CR]. Université de Paris, 2021. English
Post-quantum cryptography refers to a branch of cryptography aimed at designing non-quantum (ie. classical) cryptographic systems which are secure against an adversary having a quantum computer. In this thesis we focus on the study of two fondamental
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::bf6efcb3254feab9f0b5a9944ec997b0
https://hal.archives-ouvertes.fr/tel-03350468
https://hal.archives-ouvertes.fr/tel-03350468
Publikováno v:
IEEE Access, Vol 7, Pp 111709-111726 (2019)
From an individual's perspective, technological advancement has merits and demerits. Video captured by surveillance cameras while a person goes about their daily life may improve their personal safety but the images collected may also represent an in
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030394417
UPCommons. Portal del coneixement obert de la UPC
Universitat Politècnica de Catalunya (UPC)
UPCommons. Portal del coneixement obert de la UPC
Universitat Politècnica de Catalunya (UPC)
This paper shows the implementation on FPGA of a McEliece cryptosystem, which ensures the security recommendations given by the European Telecommunications Standards Institute (ETSI) for next generation of quantum-resistant cryptosystems. The propose
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f2f8b71ca538339de7ba0aa193a9e2e0
https://doi.org/10.1007/978-3-030-39442-4_60
https://doi.org/10.1007/978-3-030-39442-4_60
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
KAVURUCU, Yusuf, SEVER, Ömer
Publikováno v:
Journal of Naval Science and Engineering, Vol 12, Iss 1, Pp 33-50 (2016)
Volume: 12, Issue: 1 33-50
Journal of Naval Sciences and Engineering
Volume: 12, Issue: 1 33-50
Journal of Naval Sciences and Engineering
As a solution to fair exchange problem, non-repudiation protocols are being widely used over digital environment. Applications of non-repudiation protocols are spreaded over Electronic Contract Signing, Certified E-mail, electronic payment and e-comm
Autor:
Andrade, Alicia
Actualmente, la criptografía resulta de vital importancia en la protección de la información, garantizando la confidencialidad, autenticidad, integridad y disponibilidad. Dentro de esta área, las funciones resumen o hash criptográficas tienen mu
Externí odkaz:
http://hdl.handle.net/10045/96849
Publikováno v:
Second International Conference on Codes, Cryptology and Information Security, C2SI 2017
Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, Apr 2017, Rabbat, Morocco. pp.238-253, ⟨10.1007/978-3-319-55589-8_16⟩
Codes, Cryptology and Information Security ISBN: 9783319555881
C2SI
Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, Apr 2017, Rabbat, Morocco. pp.238-253, ⟨10.1007/978-3-319-55589-8_16⟩
Codes, Cryptology and Information Security ISBN: 9783319555881
C2SI
Published in Lecture Notes in Computer Science, vol 10194, pp. 238-253, Springer, Cham 2017; International audience; This paper provides a new approach to perform Correlation Power Analysis (CPA) attack. Power analysis attacks are side channel attack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b02ee2e1f6676a84a459f100f86bee9
https://hal.archives-ouvertes.fr/hal-01652010
https://hal.archives-ouvertes.fr/hal-01652010