Interactions between Group Theory, Symmetry and Cryptology
| Interactions between Group Theory, Symmetry and Cryptology |
| Autore | González Vasco María Isabel |
| Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2020 |
| Descrizione fisica | 1 online resource (164 p.) |
| Soggetto non controllato |
algebraic-geometry code
algorithms in groups alternating group Berlekamp-Massey algorithm beyond birthday bound block cipher braid groups cryptanalysis cryptography digital signatures Engel words error-correcting code euclidean algorithm generalized self-shrinking generator group key establishment group theory group-based cryptography ideal cipher model key agreement protocol key equation lightweight cryptography non-commutative cryptography NP-Completeness numerical semigroup one-way functions permutation group post-quantum cryptography protocol compiler provable security pseudo-random number generator pseudorandom permutation Reed-Solomon codes semigroup ideal statistical randomness tests Sugiyama et al. algorithm symmetry t-modified self-shrinking generator WalnutDSA Weierstrass semigroup |
| ISBN | 3-03928-803-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910404086703321 |
González Vasco María Isabel
|
||
| MDPI - Multidisciplinary Digital Publishing Institute, 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
| Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography |
| Autore | Djordjevic Ivan B |
| Descrizione fisica | 1 online resource (210 p.) |
| Soggetto topico |
History of engineering and technology
Technology: general issues |
| Soggetto non controllato |
algorithm
amplification Bayesian statistics clock synchronization conclusive exclusion continuous variable (CV)-QKD continuous-variable quantum key distribution detection probability discrete phase randomization discrete variable (DV)-QKD distillation entanglement EPR pairs geometrical optics restricted eavesdropping information disturbance theorem injection attacks intrinsic bit error rate jamming attacks mean multi-kings' problem mean-king's problem measurement device independent measurement-device-independent n/a oblivious transfer phase-matching physical layer security pilot randomization post-quantum cryptography postquantum cryptography (PQC) private equality tests QKD quantum communications quantum communications networks (QCNs) quantum cryptography quantum entanglement quantum identity authentication quantum information theory quantum key distribution quantum key distribution (QKD) quantum network reconciliation satellite-to-satellite secret key distillation secret key generation single-photon mode surface codes synchronization the Bernstein-Vazirani algorithm twin-field quantum key distribution underwater channel universal composability vulnerability zero-photon catalysis |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910595075303321 |
Djordjevic Ivan B
|
||
| Lo trovi qui: Univ. Federico II | ||
| ||
Side Channel Attacks / Seokhie Hong
| Side Channel Attacks / Seokhie Hong |
| Autore | Hong Seokhie |
| Pubbl/distr/stampa | MDPI - Multidisciplinary Digital Publishing Institute, 2019 |
| Descrizione fisica | 1 electronic resource (258 p.) |
| Soggetto topico | History of engineering and technology |
| Soggetto non controllato |
binary Huff curve
FPGA post quantum cryptography data loss side-channel cache attacks rsa cryptosystem first-order analysis chaotic circuit integrity ad libraries power-analysis attack single trace analysis side-channel authentication provable security ad lib cache misses cache side-channel attack leakage model NTRU graph AES hardware security recovery of secret exponent by triangular trace analysis side-channel attacks information leakage data outsourcing CPLD scatter-gather implementation modular exponentiation lattice-based cryptography elliptic curve cryptography Gaussian sampling post-quantum cryptography reliability unified point addition ad networks graph similarity mobile ads physically unclonable function tweakable block cipher Merkle (hash) tree machine-learning classification side channel attack online authentication side channel analysis financial IC card side-channel attack re-keying cloud computing cryptographic keys chaos theory horizontal collision correlation analysis countermeasure embedded system security cache attack single-trace attack software development kit (SDK) CDT sampling key bit-dependent attack side-channel analysis second-order analysis constant-time cryptographic algorithm android package (APK) challenge-response authentication |
| ISBN |
9783039210015
3039210017 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910346673703321 |
Hong Seokhie
|
||
| MDPI - Multidisciplinary Digital Publishing Institute, 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||