Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Post-Quantum Lattice-Based Cryptography Implementations: A SurveyNejatollahi, Hamid ; Dutt, Nikil ; Ray, Sandip ; Regazzoni, Francesco ; Banerjee, Indranil ; Cammarota, RosarioACM computing surveys, 2019-02, Vol.51 (6), p.1-41, Article 129 [Periódico revisado por pares]New York, NY, USA: ACMTexto completo disponível |
|
2 |
Material Type: Ata de Congresso
|
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeAdrian, David ; Bhargavan, Karthikeyan ; Durumeric, Zakir ; Gaudry, Pierrick ; Green, Matthew ; Halderman, J. Alex ; Heninger, Nadia ; Springall, Drew ; Thomé, Emmanuel ; Valenta, Luke ; VanderSloot, Benjamin ; Wustrow, Eric ; Zanella-Béguelin, Santiago ; Zimmermann, PaulProceedings of the 22nd ACM SIGSAC Conference on computer and communications security, 2015, p.5-17ACMTexto completo disponível |
|
3 |
Material Type: Artigo
|
Security of internet of things based on cryptographic algorithms: a surveyMousavi, Seyyed Keyvan ; Ghaffari, Ali ; Besharat, Sina ; Afshari, HamedWireless networks, 2021-02, Vol.27 (2), p.1515-1555 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
|
4 |
Material Type: Artigo
|
Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity LearningRaz, RanJournal of the ACM, 2019-01, Vol.66 (1), p.1-18 [Periódico revisado por pares]New York: ACMTexto completo disponível |
|
5 |
Material Type: Artigo
|
An Applied Image Cryptosystem on Moore’s Automaton Operating on δ (qk)/ 2Deb, Subhrajyoti ; Das, Abhilash ; Kar, NirmalyaACM transactions on multimedia computing communications and applications, 2024-02, Vol.20 (2), p.1-20, Article 52 [Periódico revisado por pares]New York, NY, USA: ACMTexto completo disponível |
|
6 |
Material Type: Ata de Congresso
|
Can homomorphic encryption be practical?Naehrig, Michael ; Lauter, Kristin ; Vaikuntanathan, VinodProceedings of the 3rd ACM workshop on cloud computing security workshop, 2011, p.113-124ACMTexto completo disponível |
|
7 |
Material Type: Artigo
|
Security of Distance-Bounding: A SurveyAvoine, Gildas ; Bingöl, Muhammed ; Boureanu, Ioana ; čapkun, Srdjan ; Hancke, Gerhard ; Kardaş, Süleyman ; Kim, Chong ; Lauradoux, Cédric ; Martin, Benjamin ; Munilla, Jorge ; Peinado, Alberto ; Rasmussen, Kasper ; Singelée, Dave ; Tchamkerten, Aslan ; Trujillo-Rasua, Rolando ; Vaudenay, SergeACM computing surveys, 2019-01, Vol.51 (5), p.1-33 [Periódico revisado por pares]Baltimore: ACMTexto completo disponível |
|
8 |
Material Type: Artigo
|
A Survey of IoT Applications in Blockchain Systems: Architecture, Consensus, and Traffic ModelingLao, Laphou ; Li, Zecheng ; Hou, Songlin ; Xiao, Bin ; Guo, Songtao ; Yang, YuanyuanACM computing surveys, 2020-02, Vol.53 (1), p.1-32 [Periódico revisado por pares]Baltimore: ACMTexto completo disponível |
|
9 |
Material Type: Ata de Congresso
|
Beyond ECDSA and RSA: Lattice-based Digital Signatures on Constrained DevicesOder, Tobias ; Pöppelmann, Thomas ; Güneysu, TimProceedings of the 51st Annual Design Automation Conference, 2014, p.1-6ACMTexto completo disponível |
|
10 |
Material Type: Artigo
|
On lattices, learning with errors, random linear codes, and cryptographyRegev, OdedJournal of the ACM, 2009-09, Vol.56 (6), p.1-40 [Periódico revisado por pares]New York, NY: ACMTexto completo disponível |