top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Interactions between Group Theory, Symmetry and Cryptology
Interactions between Group Theory, Symmetry and Cryptology
Autore González Vasco María Isabel
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2020
Descrizione fisica 1 electronic resource (164 p.)
Soggetto non controllato NP-Completeness
protocol compiler
post-quantum cryptography
Reed–Solomon codes
key equation
euclidean algorithm
permutation group
t-modified self-shrinking generator
ideal cipher model
algorithms in groups
lightweight cryptography
generalized self-shrinking generator
numerical semigroup
pseudo-random number generator
symmetry
pseudorandom permutation
Berlekamp–Massey algorithm
semigroup ideal
algebraic-geometry code
non-commutative cryptography
provable security
Engel words
block cipher
cryptography
beyond birthday bound
Weierstrass semigroup
group theory
braid groups
statistical randomness tests
group-based cryptography
alternating group
WalnutDSA
Sugiyama et al. algorithm
cryptanalysis
digital signatures
one-way functions
key agreement protocol
error-correcting code
group key establishment
ISBN 3-03928-803-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910404086703321
González Vasco María Isabel  
MDPI - Multidisciplinary Digital Publishing Institute, 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
Autore Djordjevic Ivan B
Pubbl/distr/stampa Basel, : MDPI Books, 2022
Descrizione fisica 1 electronic resource (210 p.)
Soggetto topico Technology: general issues
History of engineering & technology
Soggetto non controllato continuous-variable quantum key distribution
measurement device independent
zero-photon catalysis
underwater channel
quantum key distribution (QKD)
discrete variable (DV)-QKD
continuous variable (CV)-QKD
postquantum cryptography (PQC)
quantum communications networks (QCNs)
quantum communications
entanglement
surface codes
quantum cryptography
quantum key distribution
quantum network
measurement-device-independent
mean-king's problem
mean multi-kings' problem
information disturbance theorem
QKD
distillation
amplification
reconciliation
quantum identity authentication
private equality tests
conclusive exclusion
single-photon mode
synchronization
algorithm
detection probability
vulnerability
twin-field quantum key distribution
phase-matching
discrete phase randomization
intrinsic bit error rate
the Bernstein-Vazirani algorithm
EPR pairs
quantum entanglement
quantum information theory
geometrical optics restricted eavesdropping
secret key distillation
satellite-to-satellite
physical layer security
secret key generation
injection attacks
jamming attacks
pilot randomization
clock synchronization
Bayesian statistics
oblivious transfer
post-quantum cryptography
universal composability
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910595075303321
Djordjevic Ivan B  
Basel, : MDPI Books, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Side Channel Attacks
Side Channel Attacks
Autore Hong Seokhie
Pubbl/distr/stampa MDPI - Multidisciplinary Digital Publishing Institute, 2019
Descrizione fisica 1 electronic resource (258 p.)
Soggetto non controllato binary Huff curve
FPGA
post quantum cryptography
data loss
side-channel cache attacks
rsa cryptosystem
first-order analysis
chaotic circuit
integrity
ad libraries
power-analysis attack
single trace analysis
side-channel authentication
provable security
ad lib
cache misses
cache side-channel attack
leakage model
NTRU
graph
AES
hardware security
recovery of secret exponent by triangular trace analysis
side-channel attacks
information leakage
data outsourcing
CPLD
scatter-gather implementation
modular exponentiation
lattice-based cryptography
elliptic curve cryptography
Gaussian sampling
post-quantum cryptography
reliability
unified point addition
ad networks
graph similarity
mobile ads
physically unclonable function
tweakable block cipher
Merkle (hash) tree
machine-learning classification
side channel attack
online authentication
side channel analysis
financial IC card
side-channel attack
re-keying
cloud computing
cryptographic keys
chaos theory
horizontal collision correlation analysis
countermeasure
embedded system security
cache attack
single-trace attack
software development kit (SDK)
CDT sampling
key bit-dependent attack
side-channel analysis
second-order analysis
constant-time cryptographic algorithm
android package (APK)
challenge-response authentication
ISBN 3-03921-001-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910346673703321
Hong Seokhie  
MDPI - Multidisciplinary Digital Publishing Institute, 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui