Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Efficient Encryption From Random Quasi-Cyclic CodesAguilar-Melchor, Carlos ; Blazy, Olivier ; Deneuville, Jean-Christophe ; Gaborit, Philippe ; Zemor, GillesIEEE transactions on information theory, 2018-05, Vol.64 (5), p.3927-3943 [Peer Reviewed Journal]New York: IEEEFull text available |
|
2 |
Material Type: Conference Proceeding
|
Breaking Symmetric Cryptosystems Using Quantum Period FindingKaplan, Marc ; Leurent, Gaëtan ; Leverrier, Anthony ; Naya-Plasencia, MaríaAdvances in Cryptology – CRYPTO 2016, 2016, Vol.9815, p.207-237 [Peer Reviewed Journal]Berlin, Heidelberg: Springer Berlin HeidelbergFull text available |
|
3 |
Material Type: Article
|
Ascon v1.2: Lightweight Authenticated Encryption and HashingDobraunig, Christoph ; Eichlseder, Maria ; Mendel, Florian ; Schläffer, MartinJournal of cryptology, 2021-07, Vol.34 (3), Article 33 [Peer Reviewed Journal]New York: Springer USFull text available |
|
4 |
Material Type: Conference Proceeding
|
An Algebraic Attack on Rank Metric Code-Based CryptosystemsBardet, Magali ; Briaud, Pierre ; Bros, Maxime ; Gaborit, Philippe ; Neiger, Vincent ; Ruatta, Olivier ; Tillich, Jean-PierreAdvances in Cryptology – EUROCRYPT 2020, Vol.12107, p.64-93 [Peer Reviewed Journal]Cham: Springer International PublishingNo full-text |
|
5 |
Material Type: Book
|
The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital EncryptionHolden, JoshuaPrinceton: Princeton University Press 2018No full-text |
|
6 |
Material Type: Article
|
Verification of Quantum Computation: An Overview of Existing ApproachesGheorghiu, Alexandru ; Kapourniotis, Theodoros ; Kashefi, ElhamTheory of computing systems, 2019-05, Vol.63 (4), p.715-808 [Peer Reviewed Journal]New York: Springer USFull text available |
|
7 |
Material Type: Article
|
Using quantum key distribution for cryptographic purposes: A surveyAlléaume, R. ; Branciard, C. ; Bouda, J. ; Debuisschert, T. ; Dianati, M. ; Gisin, N. ; Godfrey, M. ; Grangier, P. ; Länger, T. ; Lütkenhaus, N. ; Monyk, C. ; Painchault, P. ; Peev, M. ; Poppe, A. ; Pornin, T. ; Rarity, J. ; Renner, R. ; Ribordy, G. ; Riguidel, M. ; Salvail, L. ; Shields, A. ; Weinfurter, H. ; Zeilinger, A.Theoretical computer science, 2014-12, Vol.560 (1), p.62-81 [Peer Reviewed Journal]Elsevier B.VFull text available |
|
8 |
Material Type: Article
|
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous CredentialsFuchsbauer, Georg ; Hanser, Christian ; Slamanig, DanielJournal of cryptology, 2019-04, Vol.32 (2), p.498-546 [Peer Reviewed Journal]New York: Springer USFull text available |
|
9 |
Material Type: Article
|
Low Rank Parity Check Codes: New Decoding Algorithms and Applications to CryptographyAragon, Nicolas ; Gaborit, Philippe ; Hauteville, Adrien ; Ruatta, Olivier ; Zemor, GillesIEEE transactions on information theory, 2019-12, Vol.65 (12), p.7697-7717 [Peer Reviewed Journal]IEEEFull text available |
|
10 |
Material Type: Conference Proceeding
|
Towards Practical Key Exchange from Ordinary Isogeny GraphsDe Feo, Luca ; Kieffer, Jean ; Smith, BenjaminAdvances in Cryptology – ASIACRYPT 2018, Vol.11274, p.365-394 [Peer Reviewed Journal]Cham: Springer International PublishingNo full-text |