by
Nielsen, Jesper Buus. editor.
Format:
Electronic Resources
Excerpt:
; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. .
by
Nielsen, Jesper Buus. editor.
Format:
Electronic Resources
Excerpt:
; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography. .
View Other Search Results
by
Nielsen, Jesper Buus. editor.
Format:
Electronic Resources
Excerpt:
; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cryptography. .
by
Safavi-Naini, Reihaneh. editor.
Format:
Electronic Resources
Excerpt:
Computation -- Theory of Quantum Key Distribution: The Road Ahead (Invited Talk) -- Susceptible Two-Party
by
Menezes, Alfred. editor.
Format:
Electronic Resources
Excerpt:
(Amplified) Boomerang Attack -- Amplifying Collision Resistance: A Complexity-Theoretic Treatment -- Theory
by
Furon, Teddy. editor.
Format:
Electronic Resources
Excerpt:
Oracles -- Steganography and Code Theory -- How Can Reed-Solomon Codes Improve Steganographic Schemes
by
Canetti, Ran. editor.
Format:
Electronic Resources
Excerpt:
-- MPC vs. SFE: Perfect Security in a Unified Corruption Model -- Invited Talk -- Bridging Game Theory
by
Hu, Jiankun. editor.
Format:
Electronic Resources
Excerpt:
Security Reduction -- Quantum authentication scheme based on fingerprintencoded graph states -- Cooperative
Limit Search Results
Narrowed by: