Interactions between Group Theory, Symmetry and Cryptology |
Autore | González Vasco María Isabel |
Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2020 |
Descrizione fisica | 1 electronic resource (164 p.) |
Soggetto non controllato |
NP-Completeness
protocol compiler post-quantum cryptography Reed–Solomon codes key equation euclidean algorithm permutation group t-modified self-shrinking generator ideal cipher model algorithms in groups lightweight cryptography generalized self-shrinking generator numerical semigroup pseudo-random number generator symmetry pseudorandom permutation Berlekamp–Massey algorithm semigroup ideal algebraic-geometry code non-commutative cryptography provable security Engel words block cipher cryptography beyond birthday bound Weierstrass semigroup group theory braid groups statistical randomness tests group-based cryptography alternating group WalnutDSA Sugiyama et al. algorithm cryptanalysis digital signatures one-way functions key agreement protocol error-correcting code group key establishment |
ISBN | 3-03928-803-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910404086703321 |
González Vasco María Isabel
![]() |
||
MDPI - Multidisciplinary Digital Publishing Institute, 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography |
Autore | Djordjevic Ivan B |
Pubbl/distr/stampa | Basel, : MDPI Books, 2022 |
Descrizione fisica | 1 electronic resource (210 p.) |
Soggetto topico |
Technology: general issues
History of engineering & technology |
Soggetto non controllato |
continuous-variable quantum key distribution
measurement device independent zero-photon catalysis underwater channel quantum key distribution (QKD) discrete variable (DV)-QKD continuous variable (CV)-QKD postquantum cryptography (PQC) quantum communications networks (QCNs) quantum communications entanglement surface codes quantum cryptography quantum key distribution quantum network measurement-device-independent mean-king's problem mean multi-kings' problem information disturbance theorem QKD distillation amplification reconciliation quantum identity authentication private equality tests conclusive exclusion single-photon mode synchronization algorithm detection probability vulnerability twin-field quantum key distribution phase-matching discrete phase randomization intrinsic bit error rate the Bernstein-Vazirani algorithm EPR pairs quantum entanglement quantum information theory geometrical optics restricted eavesdropping secret key distillation satellite-to-satellite physical layer security secret key generation injection attacks jamming attacks pilot randomization clock synchronization Bayesian statistics oblivious transfer post-quantum cryptography universal composability |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910595075303321 |
Djordjevic Ivan B
![]() |
||
Basel, : MDPI Books, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Side Channel Attacks |
Autore | Hong Seokhie |
Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
Descrizione fisica | 1 electronic resource (258 p.) |
Soggetto non controllato |
binary Huff curve
FPGA post quantum cryptography data loss side-channel cache attacks rsa cryptosystem first-order analysis chaotic circuit integrity ad libraries power-analysis attack single trace analysis side-channel authentication provable security ad lib cache misses cache side-channel attack leakage model NTRU graph AES hardware security recovery of secret exponent by triangular trace analysis side-channel attacks information leakage data outsourcing CPLD scatter-gather implementation modular exponentiation lattice-based cryptography elliptic curve cryptography Gaussian sampling post-quantum cryptography reliability unified point addition ad networks graph similarity mobile ads physically unclonable function tweakable block cipher Merkle (hash) tree machine-learning classification side channel attack online authentication side channel analysis financial IC card side-channel attack re-keying cloud computing cryptographic keys chaos theory horizontal collision correlation analysis countermeasure embedded system security cache attack single-trace attack software development kit (SDK) CDT sampling key bit-dependent attack side-channel analysis second-order analysis constant-time cryptographic algorithm android package (APK) challenge-response authentication |
ISBN | 3-03921-001-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910346673703321 |
Hong Seokhie
![]() |
||
MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|