Artículos de revistas sobre el tema "Lattice based encryption"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Lattice based encryption".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Kadykov, Victor, Alla Levina y Alexander Voznesensky. "Homomorphic Encryption within Lattice-Based Encryption System". Procedia Computer Science 186 (2021): 309–15. http://dx.doi.org/10.1016/j.procs.2021.04.149.
Texto completoBandara, Harshana, Yasitha Herath, Thushara Weerasundara y Janaka Alawatugoda. "On Advances of Lattice-Based Cryptographic Schemes and Their Implementations". Cryptography 6, n.º 4 (9 de noviembre de 2022): 56. http://dx.doi.org/10.3390/cryptography6040056.
Texto completoJiang, Mingming, Yupu Hu, Hao Lei, Baocang Wang y Qiqi Lai. "Lattice-based certificateless encryption scheme". Frontiers of Computer Science 8, n.º 5 (31 de julio de 2014): 828–36. http://dx.doi.org/10.1007/s11704-014-3187-6.
Texto completoZeng, Fugeng y Chunxiang Xu. "A Novel Model for Lattice-Based Authorized Searchable Encryption with Special Keyword". Mathematical Problems in Engineering 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/314621.
Texto completoKumar, Vishnu. "Text Encryption using Lattice-Based Cryptography". IOSR Journal of Computer Engineering 16, n.º 2 (2014): 148–51. http://dx.doi.org/10.9790/0661-1628148151.
Texto completoLi, Zengpeng, Can Xiang y Chengyu Wang. "Oblivious Transfer via Lossy Encryption from Lattice-Based Cryptography". Wireless Communications and Mobile Computing 2018 (2 de septiembre de 2018): 1–11. http://dx.doi.org/10.1155/2018/5973285.
Texto completoCheng, Rong y Fangguo Zhang. "Lattice-based obfuscation for re-encryption functions". Security and Communication Networks 8, n.º 9 (20 de octubre de 2014): 1648–58. http://dx.doi.org/10.1002/sec.1112.
Texto completoKadykov, V. Yu y A. B. Levina. "HOMOMORPHIC OPERATIONS WITHIN IDEAL LATTICE BASED ENCRYPTION SYSTEMS". Vestnik komp'iuternykh i informatsionnykh tekhnologii, n.º 198 (diciembre de 2020): 40–46. http://dx.doi.org/10.14489/vkit.2020.12.pp.040-046.
Texto completoCisneros, Mauricio y Javier Olazabal. "Lattice-Based Cryptography in the Quantum Era: A Survey". Interfases, n.º 018 (29 de diciembre de 2023): 281–99. http://dx.doi.org/10.26439/interfases2023.n018.6631.
Texto completoFu, Xingbing, Yong Ding, Haifeng Li, Jianting Ning, Ting Wu y Fagen Li. "A survey of lattice based expressive attribute based encryption". Computer Science Review 43 (febrero de 2022): 100438. http://dx.doi.org/10.1016/j.cosrev.2021.100438.
Texto completoRenteria-Mejia, Claudia P. y Jaime Velasco-Medina. "Lattice-Based Cryptoprocessor for CCA-Secure Identity-Based Encryption". IEEE Transactions on Circuits and Systems I: Regular Papers 67, n.º 7 (julio de 2020): 2331–44. http://dx.doi.org/10.1109/tcsi.2020.2981089.
Texto completoZhang, Guo Yan. "Fuzzy Certificateless Identity-Based Encryption Protocol from Lattice". Applied Mechanics and Materials 380-384 (agosto de 2013): 2262–66. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2262.
Texto completoB M, Chandrakala y S. C. Lingareddy. "Proxy Re-Encryption in cloud using ALBC (adaptive lattice based cryptography)". Indonesian Journal of Electrical Engineering and Computer Science 16, n.º 3 (1 de diciembre de 2019): 1455. http://dx.doi.org/10.11591/ijeecs.v16.i3.pp1455-1463.
Texto completoMa, Chunguang, Juyan Li y Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Texto completoYe, Qing, Qiaojia Zhang, Sijie Liu y Kaiqiang Chen. "A novel chaotic system based on coupled map lattice and its application in HEVC encryption". Mathematical Biosciences and Engineering 18, n.º 6 (2021): 9410–29. http://dx.doi.org/10.3934/mbe.2021463.
Texto completoROZLOMII, Inna. "METHOD OF CONSTRUCTION MATRIX CARDANO’S GRIDS FOR COMPRESSION OF INFORMATION". Herald of Khmelnytskyi National University 305, n.º 1 (23 de febrero de 2022): 84–89. http://dx.doi.org/10.31891/2307-5732-2022-305-1-84-89.
Texto completoJiang, M. M., Y. P. Hu, B. C. Wang, F. H. Wang y Q. Q. Lai. "Lattice-based multi-use unidirectional proxy re-encryption". Security and Communication Networks 8, n.º 18 (29 de junio de 2015): 3796–803. http://dx.doi.org/10.1002/sec.1300.
Texto completoSabani, Maria E., Ilias K. Savvas, Dimitrios Poulakis, Georgia Garani y Georgios C. Makris. "Evaluation and Comparison of Lattice-Based Cryptosystems for a Secure Quantum Computing Era". Electronics 12, n.º 12 (12 de junio de 2023): 2643. http://dx.doi.org/10.3390/electronics12122643.
Texto completoLi, Juyan, Zhiqi Qiao, Kejia Zhang y Chen Cui. "A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing". Sensors 21, n.º 1 (4 de enero de 2021): 288. http://dx.doi.org/10.3390/s21010288.
Texto completoLiu, Yuan, Licheng Wang, Xiaoying Shen y Lixiang Li. "New Constructions of Identity-Based Dual Receiver Encryption from Lattices". Entropy 22, n.º 6 (28 de mayo de 2020): 599. http://dx.doi.org/10.3390/e22060599.
Texto completoSingh, Kunwar, C. Pandu Rangan y A. K. Banerjee. "Lattice-based identity-based resplittable threshold public key encryption scheme". International Journal of Computer Mathematics 93, n.º 2 (27 de junio de 2014): 289–307. http://dx.doi.org/10.1080/00207160.2014.928286.
Texto completoGonzález de la Torre, Miguel Ángel, Luis Hernández Encinas y Araceli Queiruga-Dios. "Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms". Mathematics 10, n.º 16 (17 de agosto de 2022): 2967. http://dx.doi.org/10.3390/math10162967.
Texto completoDong, Xingting, Yanhua Zhang, Baocang Wang y Jiangshan Chen. "Server-Aided Revocable Attribute-Based Encryption from Lattices". Security and Communication Networks 2020 (12 de febrero de 2020): 1–13. http://dx.doi.org/10.1155/2020/1460531.
Texto completoWANG, FENGHE, XU AN WANG y CHUNXIAO WANG. "Lattice-based Dynamical and Anonymous Broadcast Encryption Scheme for Wireless Ad Hoc Networks". Journal of Interconnection Networks 15, n.º 03n04 (septiembre de 2015): 1540005. http://dx.doi.org/10.1142/s0219265915400058.
Texto completoLing, San, Khoa Nguyen, Huaxiong Wang y Juanyang Zhang. "Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation". Computer Journal 62, n.º 12 (18 de noviembre de 2019): 1849–62. http://dx.doi.org/10.1093/comjnl/bxz079.
Texto completoZhang, Xiaojun, Chunxiang Xu, Liming Mu y Jie Zhao. "Identity-based encryption with keyword search from lattice assumption". China Communications 15, n.º 4 (abril de 2018): 164–78. http://dx.doi.org/10.1109/cc.2018.8357694.
Texto completoYao, Yanqing, Zhengde Zhai, Jianwei Liu y Zhoujun Li. "Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage". IEEE Access 7 (2019): 164544–55. http://dx.doi.org/10.1109/access.2019.2952163.
Texto completoSolé, P., C. Charnes y B. Martin. "A lattice-based McEliece scheme for encryption and signature". Electronic Notes in Discrete Mathematics 6 (abril de 2001): 402–11. http://dx.doi.org/10.1016/s1571-0653(04)00192-1.
Texto completoBehnia, Rouzbeh, Muslum Ozgur Ozmen y Attila Altay Yavuz. "Lattice-Based Public Key Searchable Encryption from Experimental Perspectives". IEEE Transactions on Dependable and Secure Computing 17, n.º 6 (1 de noviembre de 2020): 1269–82. http://dx.doi.org/10.1109/tdsc.2018.2867462.
Texto completoLv, Xiupin, Xiaofeng Liao y Bo Yang. "Bit-level plane image encryption based on coupled map lattice with time-varying delay". Modern Physics Letters B 32, n.º 10 (10 de abril de 2018): 1850124. http://dx.doi.org/10.1142/s0217984918501245.
Texto completoDel Rey, A. Martín y G. Rodríguez Sánchez. "An image encryption algorithm based on 3D cellular automata and chaotic maps". International Journal of Modern Physics C 26, n.º 01 (enero de 2015): 1450069. http://dx.doi.org/10.1142/s0129183114500697.
Texto completoAbusham, Eimad, Basil Ibrahim, Kashif Zia y Sanad Al Maskari. "An Integration of New Digital Image Scrambling Technique on PCA-Based Face Recognition System". Scientific Programming 2022 (25 de noviembre de 2022): 1–17. http://dx.doi.org/10.1155/2022/2628885.
Texto completoLuo, Fucai y Saif Al-Kuwari. "Revocable attribute-based proxy re-encryption". Journal of Mathematical Cryptology 15, n.º 1 (1 de enero de 2021): 465–82. http://dx.doi.org/10.1515/jmc-2020-0039.
Texto completoChen, Qihong, Mingming Jiang, Yuyan Guo, Dongbing Zhang, Weina Jia y Wen Zheng. "Efficient Multibit Function Encryption for Data Security in Internet of Things". Security and Communication Networks 2022 (14 de abril de 2022): 1–10. http://dx.doi.org/10.1155/2022/3227712.
Texto completoChillali, Abdelhakim, Mohammed Elhassani y Ali Mouhib. "Cryptosystem based on lattice and elliptic curve". Gulf Journal of Mathematics 8, n.º 2 (17 de agosto de 2020): 27–34. http://dx.doi.org/10.56947/gjom.v8i2.362.
Texto completoHe, Hong, Hong Dong, Tong Yang, Lin He y Yi Wu. "A Design of a Method of Chaos-Based Secure Communication". Advanced Materials Research 204-210 (febrero de 2011): 508–11. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.508.
Texto completoYan, Jianhua, Licheng Wang, Lihua Wang, Yixian Yang y Wenbin Yao. "Efficient Lattice-Based Signcryption in Standard Model". Mathematical Problems in Engineering 2013 (2013): 1–18. http://dx.doi.org/10.1155/2013/702539.
Texto completoWANG, XING-YUAN y TIAN WANG. "A NOVEL ALGORITHM FOR IMAGE ENCRYPTION BASED ON COUPLE CHAOTIC SYSTEMS". International Journal of Modern Physics B 26, n.º 30 (7 de octubre de 2012): 1250175. http://dx.doi.org/10.1142/s0217979212501755.
Texto completoYu, Xiaoling, Chungen Xu, Lei Xu y Yuntao Wang. "Lattice-Based Searchable Encryption Scheme Against Inside Keywords Guessing Attack". Computers, Materials & Continua 64, n.º 2 (2020): 1107–25. http://dx.doi.org/10.32604/cmc.2020.09680.
Texto completoSepahi, Reza, Ron Steinfeld y Josef Pieprzyk. "Lattice-based certificateless public-key encryption in the standard model". International Journal of Information Security 13, n.º 4 (10 de diciembre de 2013): 315–33. http://dx.doi.org/10.1007/s10207-013-0215-8.
Texto completoHe, Kai, Xueqiao Liu, Jia-Nan Liu y Wei Liu. "Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things". Security and Communication Networks 2021 (13 de diciembre de 2021): 1–11. http://dx.doi.org/10.1155/2021/2847731.
Texto completoMukherjee, Anisha, Aikata Aikata, Ahmet Can Mert, Yongwoo Lee, Sunmin Kwon, Maxim Deryabin y Sujoy Sinha Roy. "ModHE: Modular Homomorphic Encryption Using Module Lattices". IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, n.º 1 (4 de diciembre de 2023): 527–62. http://dx.doi.org/10.46586/tches.v2024.i1.527-562.
Texto completoYan, Jianhua, Xiuhua Lu, Muzi Li, Licheng Wang, Jingxian Zhou y Wenbin Yao. "Practical NTRU Signcryption in the Standard Model". Entropy 25, n.º 12 (13 de diciembre de 2023): 1651. http://dx.doi.org/10.3390/e25121651.
Texto completoXingyuan, Wang, Gao Suo, Ye Xiaolin, Zhou Shuang y Wang Mingxu. "A New Image Encryption Algorithm with Cantor Diagonal Scrambling Based on the PUMCML System". International Journal of Bifurcation and Chaos 31, n.º 01 (enero de 2021): 2150003. http://dx.doi.org/10.1142/s0218127421500036.
Texto completoYang, Nan y Youliang Tian. "Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE". Security and Communication Networks 2023 (3 de enero de 2023): 1–9. http://dx.doi.org/10.1155/2023/3765934.
Texto completoLi, Juyan, Chunguang Ma y Kejia Zhang. "A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing". Symmetry 11, n.º 10 (9 de octubre de 2019): 1262. http://dx.doi.org/10.3390/sym11101262.
Texto completoLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li y Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes". Security and Communication Networks 2020 (7 de agosto de 2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Texto completoB M, Chandrakala y S. C. Linga Reddy. "Secure and Efficient Bi-Directional Proxy Re-Encyrption Technique". Indonesian Journal of Electrical Engineering and Computer Science 12, n.º 3 (1 de diciembre de 2018): 1143. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1143-1150.
Texto completoLin, Hui, Dongsheng Liu, Cong Zhang y Yahui Dong. "Design and Implementation of a Lattice-Based Public-Key Encryption Scheme". Journal of Circuits, Systems and Computers 27, n.º 13 (3 de agosto de 2018): 1850201. http://dx.doi.org/10.1142/s0218126618502018.
Texto completoDutta, Priyanka, Willy Susilo, Dung Hoang Duong y Partha Sarathi Roy. "Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model". Theoretical Computer Science 871 (junio de 2021): 16–29. http://dx.doi.org/10.1016/j.tcs.2021.04.008.
Texto completo