Contents
Academic literature on the topic 'Rainbow Signature Scheme'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Rainbow Signature Scheme.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Rainbow Signature Scheme"
Ostrianska, Yelyzaveta, and Olha Mirzoieva. "Generation of general system parameters for Rainbow signature scheme." Physico-mathematical modelling and informational technologies, no. 33 (September 3, 2021): 83–87. http://dx.doi.org/10.15407/fmmit2021.33.083.
Full textLuyen, Le. "An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow." Cryptography 3, no. 1 (2019): 8. http://dx.doi.org/10.3390/cryptography3010008.
Full textMaleeva, G. A. "Analysis of partial key recovery attack on multivariate cryptographic transformations using rank systems." Radiotekhnika, no. 209 (June 24, 2022): 64–70. http://dx.doi.org/10.30837/rt.2022.2.209.06.
Full textShang, Pei Ni, and Zhu Lian Gao. "An Authentication Scheme Based on the Light-Weight Rainbow Signature for Wireless Sensor Network." Applied Mechanics and Materials 519-520 (February 2014): 185–88. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.185.
Full textYesina, M. V., S. O. Kandiy, E. V. Ostryanska, and I. D. Gorbenko. "Generation of general system parameters for Rainbow electronic signature scheme for 384 and 512 security bits." Radiotekhnika, no. 204 (April 9, 2021): 16–23. http://dx.doi.org/10.30837/rt.2021.1.204.02.
Full textMaleeva, G. А. "Analysis of security of post-quantum algorithm of Rainbow electronic signature against potential attacks." Radiotekhnika, no. 205 (July 2, 2021): 85–93. http://dx.doi.org/10.30837/rt.2021.2.205.08.
Full textKandiy, S. O., and G. A. Maleeva. "Analysis of the complexity of attacks on multivariate cryptographic transformations using algebraic field structure." Radiotekhnika, no. 204 (April 9, 2021): 59–65. http://dx.doi.org/10.30837/rt.2021.1.204.06.
Full textChen, Jiahui, Jie Ling, Jianting Ning, and Jintai Ding. "Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems." Computer Journal 62, no. 8 (2019): 1132–47. http://dx.doi.org/10.1093/comjnl/bxz013.
Full textTan, Yang, Yong Yu, Jie Chen, Shaohua Tang, and Xiangxue Li. "Building a new secure variant of Rainbow signature scheme." IET Information Security 10, no. 2 (2016): 53–59. http://dx.doi.org/10.1049/iet-ifs.2015.0016.
Full textReshikeshan, Sree Subiksha, Myung Bae Koh, and Mahesh Illindala. "Rainbow Signature Scheme to Secure GOOSE Communications From Quantum Computer Attacks." IEEE Transactions on Industry Applications 57, no. 5 (2021): 4579–86. http://dx.doi.org/10.1109/tia.2021.3093375.
Full text