top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Interactions between Group Theory, Symmetry and Cryptology
Interactions between Group Theory, Symmetry and Cryptology
Autore González Vasco María Isabel
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2020
Descrizione fisica 1 online resource (164 p.)
Soggetto non controllato algebraic-geometry code
algorithms in groups
alternating group
Berlekamp-Massey algorithm
beyond birthday bound
block cipher
braid groups
cryptanalysis
cryptography
digital signatures
Engel words
error-correcting code
euclidean algorithm
generalized self-shrinking generator
group key establishment
group theory
group-based cryptography
ideal cipher model
key agreement protocol
key equation
lightweight cryptography
non-commutative cryptography
NP-Completeness
numerical semigroup
one-way functions
permutation group
post-quantum cryptography
protocol compiler
provable security
pseudo-random number generator
pseudorandom permutation
Reed-Solomon codes
semigroup ideal
statistical randomness tests
Sugiyama et al. algorithm
symmetry
t-modified self-shrinking generator
WalnutDSA
Weierstrass semigroup
ISBN 3-03928-803-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910404086703321
González Vasco María Isabel  
MDPI - Multidisciplinary Digital Publishing Institute, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Autore Djordjevic Ivan B
Descrizione fisica 1 online resource (210 p.)
Soggetto topico History of engineering and technology
Technology: general issues
Soggetto non controllato algorithm
amplification
Bayesian statistics
clock synchronization
conclusive exclusion
continuous variable (CV)-QKD
continuous-variable quantum key distribution
detection probability
discrete phase randomization
discrete variable (DV)-QKD
distillation
entanglement
EPR pairs
geometrical optics restricted eavesdropping
information disturbance theorem
injection attacks
intrinsic bit error rate
jamming attacks
mean multi-kings' problem
mean-king's problem
measurement device independent
measurement-device-independent
n/a
oblivious transfer
phase-matching
physical layer security
pilot randomization
post-quantum cryptography
postquantum cryptography (PQC)
private equality tests
QKD
quantum communications
quantum communications networks (QCNs)
quantum cryptography
quantum entanglement
quantum identity authentication
quantum information theory
quantum key distribution
quantum key distribution (QKD)
quantum network
reconciliation
satellite-to-satellite
secret key distillation
secret key generation
single-photon mode
surface codes
synchronization
the Bernstein-Vazirani algorithm
twin-field quantum key distribution
underwater channel
universal composability
vulnerability
zero-photon catalysis
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910595075303321
Djordjevic Ivan B  
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Side Channel Attacks / Seokhie Hong
Side Channel Attacks / Seokhie Hong
Autore Hong Seokhie
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2019
Descrizione fisica 1 electronic resource (258 p.)
Soggetto topico History of engineering and technology
Soggetto non controllato binary Huff curve
FPGA
post quantum cryptography
data loss
side-channel cache attacks
rsa cryptosystem
first-order analysis
chaotic circuit
integrity
ad libraries
power-analysis attack
single trace analysis
side-channel authentication
provable security
ad lib
cache misses
cache side-channel attack
leakage model
NTRU
graph
AES
hardware security
recovery of secret exponent by triangular trace analysis
side-channel attacks
information leakage
data outsourcing
CPLD
scatter-gather implementation
modular exponentiation
lattice-based cryptography
elliptic curve cryptography
Gaussian sampling
post-quantum cryptography
reliability
unified point addition
ad networks
graph similarity
mobile ads
physically unclonable function
tweakable block cipher
Merkle (hash) tree
machine-learning classification
side channel attack
online authentication
side channel analysis
financial IC card
side-channel attack
re-keying
cloud computing
cryptographic keys
chaos theory
horizontal collision correlation analysis
countermeasure
embedded system security
cache attack
single-trace attack
software development kit (SDK)
CDT sampling
key bit-dependent attack
side-channel analysis
second-order analysis
constant-time cryptographic algorithm
android package (APK)
challenge-response authentication
ISBN 9783039210015
3039210017
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910346673703321
Hong Seokhie  
MDPI - Multidisciplinary Digital Publishing Institute, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui