Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Post-Quantum Lattice-Based Cryptography Implementations: A SurveyNejatollahi, Hamid ; Dutt, Nikil ; Ray, Sandip ; Regazzoni, Francesco ; Banerjee, Indranil ; Cammarota, RosarioACM computing surveys, 2019-11, Vol.51 (6), p.1-41, Article 129 [Periódico revisado por pares]New York, NY, USA: ACMTexto completo disponível |
|
2 |
Material Type: Ata de Congresso
|
Imperfect Forward Secrecy: How Diffie-Hellman Fails in PracticeAdrian, David ; Bhargavan, Karthikeyan ; Durumeric, Zakir ; Gaudry, Pierrick ; Green, Matthew ; Halderman, J. Alex ; Heninger, Nadia ; Springall, Drew ; Thomé, Emmanuel ; Valenta, Luke ; VanderSloot, Benjamin ; Wustrow, Eric ; Zanella-Béguelin, Santiago ; Zimmermann, PaulProceedings of the 22nd ACM SIGSAC Conference on computer and communications security, 2015, p.5-17ACMTexto completo disponível |
|
3 |
Material Type: Artigo
|
An Applied Image Cryptosystem on Moore’s Automaton Operating on δ (qk)/ 2Deb, Subhrajyoti ; Das, Abhilash ; Kar, NirmalyaACM transactions on multimedia computing communications and applications, 2024-02, Vol.20 (2), p.1-20, Article 52 [Periódico revisado por pares]New York, NY, USA: ACMTexto completo disponível |
|
4 |
Material Type: Artigo
|
Quantum Key Distribution: A Networking PerspectiveMehic, Miralem ; Niemiec, Marcin ; Rass, Stefan ; Ma, Jiajun ; Peev, Momtchil ; Aguado, Alejandro ; Martin, Vicente ; Schauer, Stefan ; Poppe, Andreas ; Pacher, Christoph ; Voznak, MiroslavACM computing surveys, 2021-09, Vol.53 (5), p.1-41 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
|
5 |
Material Type: Ata de Congresso
|
The SIMON and SPECK lightweight block ciphersBeaulieu, Ray ; Shors, Douglas ; Smith, Jason ; Treatman-Clark, Stefan ; Weeks, Bryan ; Wingers, LouisProceedings of the 52nd Annual Design Automation Conference, 2015, p.1-6ACMTexto completo disponível |
|
6 |
Material Type: Artigo
|
Lattice-based Key-sharing Schemes: A SurveyRavi, Prasanna ; Howe, James ; Chattopadhyay, Anupam ; Bhasin, ShivamACM computing surveys, 2021-04, Vol.54 (1), p.1-39 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
|
7 |
Material Type: Artigo
|
A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and DefensesChen, Huashan ; Pendleton, Marcus ; Njilla, Laurent ; Xu, ShouhuaiACM computing surveys, 2020-06, Vol.53 (3), p.1-43 [Periódico revisado por pares]Baltimore: ACMTexto completo disponível |
|
8 |
Material Type: Artigo
|
Security and Privacy on BlockchainZhang, Rui ; Xue, Rui ; Liu, LingACM computing surveys, 2019-07, Vol.52 (3), p.1-34 [Periódico revisado por pares]Baltimore: ACMTexto completo disponível |
|
9 |
Material Type: Ata de Congresso
|
Can homomorphic encryption be practical?Naehrig, Michael ; Lauter, Kristin ; Vaikuntanathan, VinodProceedings of the 3rd ACM workshop on cloud computing security workshop, 2011, p.113-124ACMTexto completo disponível |
|
10 |
Material Type: Artigo
|
Security of Distance-Bounding: A SurveyAvoine, Gildas ; Bingöl, Muhammed ; Boureanu, Ioana ; čapkun, Srdjan ; Hancke, Gerhard ; Kardaş, Süleyman ; Kim, Chong ; Lauradoux, Cédric ; Martin, Benjamin ; Munilla, Jorge ; Peinado, Alberto ; Rasmussen, Kasper ; Singelée, Dave ; Tchamkerten, Aslan ; Trujillo-Rasua, Rolando ; Vaudenay, SergeACM computing surveys, 2019-01, Vol.51 (5), p.1-33 [Periódico revisado por pares]Baltimore: ACMTexto completo disponível |