Artículos de revistas sobre el tema "Quantum random oracle model"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Quantum random oracle model".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Zhandry, Mark. "Secure identity-based encryption in the quantum random oracle model". International Journal of Quantum Information 13, n.º 04 (junio de 2015): 1550014. http://dx.doi.org/10.1142/s0219749915500148.
Texto completoShang, Tao, Ranyiliu Chen y Qi Lei. "Quantum Random Oracle Model for Quantum Public-Key Encryption". IEEE Access 7 (2019): 130024–31. http://dx.doi.org/10.1109/access.2019.2940406.
Texto completoHarrow, Aram W. y David J. Rosenbaum. "Uselessness for an Oracle model with internal randomness". Quantum Information and Computation 14, n.º 7&8 (mayo de 2014): 608–24. http://dx.doi.org/10.26421/qic14.7-8-5.
Texto completoGama, Mariana, Paulo Mateus y André Souto. "A Private Quantum Bit String Commitment". Entropy 22, n.º 3 (27 de febrero de 2020): 272. http://dx.doi.org/10.3390/e22030272.
Texto completoGoncalves, Brian y Atefeh Mashatan. "Tightly Secure PKE Combiner in the Quantum Random Oracle Model". Cryptography 6, n.º 2 (29 de marzo de 2022): 15. http://dx.doi.org/10.3390/cryptography6020015.
Texto completoBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye et al. "DAGS: Key encapsulation using dyadic GS codes". Journal of Mathematical Cryptology 12, n.º 4 (1 de diciembre de 2018): 221–39. http://dx.doi.org/10.1515/jmc-2018-0027.
Texto completoChen, Lijie y Ramis Movassagh. "Quantum Merkle Trees". Quantum 8 (18 de junio de 2024): 1380. http://dx.doi.org/10.22331/q-2024-06-18-1380.
Texto completoKandii, S. O. y I. D. Gorbenko. "Analysis of DSTU 8961:2019 in the quantum random oracle model". Radiotekhnika, n.º 214 (29 de septiembre de 2023): 7–16. http://dx.doi.org/10.30837/rt.2023.3.214.01.
Texto completoColadangelo, Andrea, Christian Majenz y Alexander Poremba. "Quantum copy-protection of compute-and-compare programs in the quantum random oracle model". Quantum 8 (2 de mayo de 2024): 1330. http://dx.doi.org/10.22331/q-2024-05-02-1330.
Texto completoYan, Jianhua, Licheng Wang, Lihua Wang, Yixian Yang y Wenbin Yao. "Efficient Lattice-Based Signcryption in Standard Model". Mathematical Problems in Engineering 2013 (2013): 1–18. http://dx.doi.org/10.1155/2013/702539.
Texto completoKretschmer, William. "The Quantum Supremacy Tsirelson Inequality". Quantum 5 (7 de octubre de 2021): 560. http://dx.doi.org/10.22331/q-2021-10-07-560.
Texto completoWang, Hao, Yu Li y Li-Ping Wang. "Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros". Security and Communication Networks 2022 (14 de julio de 2022): 1–11. http://dx.doi.org/10.1155/2022/9257443.
Texto completoGorbenko, Yu I. y S. O. Kandii. "Comparison of security arguments of promising key encapsulation mechanisms". Radiotekhnika, n.º 210 (28 de septiembre de 2022): 22–36. http://dx.doi.org/10.30837/rt.2022.3.210.02.
Texto completoLi, Fengyin, Yang Cui, Baogui Huang, Siqi Yu, Peiyu Liu, Yilei Wang y Tao Li. "A Lamus-Based Flight Data Sharing Model on Consortium Blockchain". Security and Communication Networks 2022 (9 de mayo de 2022): 1–11. http://dx.doi.org/10.1155/2022/5717185.
Texto completoWei, Lulu, Daofeng Li y Zhiqiang Liu. "Provable Secure Attribute-Based Proxy Signature Over Lattice Small Integer Solution Problem in Random Oracle Model". Electronics 12, n.º 7 (30 de marzo de 2023): 1619. http://dx.doi.org/10.3390/electronics12071619.
Texto completoSharafi, Javad y Hassan Daghigh. "A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme". Journal of Mathematical Cryptology 16, n.º 1 (1 de enero de 2022): 205–14. http://dx.doi.org/10.1515/jmc-2021-0013.
Texto completoLi, Quanrun, Chingfang Hsu, Debiao He, Kim-Kwang Raymond Choo y Peng Gong. "An Identity-Based Blind Signature Scheme Using Lattice with Provable Security". Mathematical Problems in Engineering 2020 (11 de mayo de 2020): 1–12. http://dx.doi.org/10.1155/2020/7528571.
Texto completoPreethi, Thakkalapally y Bharat Amberker. "Traceable Signatures using Lattices". International Arab Journal of Information Technology 17, n.º 6 (1 de noviembre de 2020): 965–75. http://dx.doi.org/10.34028/iajit/17/6/15.
Texto completoBranco, Pedro. "A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions". Advances in Mathematics of Communications 15, n.º 1 (2021): 113–30. http://dx.doi.org/10.3934/amc.2020046.
Texto completoP. Ravindra, S. Vasu, V. Suresh y K. Bangaru Lakshmi. "A Study on “Security of Cyber-Physical Systems in the Cloud”". Journal of Advanced Zoology 44, S-5 (15 de noviembre de 2023): 2347–64. http://dx.doi.org/10.17762/jaz.v44is-5.1854.
Texto completoLee, Hakjun. "A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain". Korean Institute of Smart Media 12, n.º 2 (30 de marzo de 2023): 76–82. http://dx.doi.org/10.30693/smj.2023.12.2.76.
Texto completoLai, Qiqi, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen y Zhenlong Li. "Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model". International Journal of Foundations of Computer Science 30, n.º 04 (junio de 2019): 589–606. http://dx.doi.org/10.1142/s0129054119400148.
Texto completoLi, Fengyin, Mengjiao Yang, Zhihao Song, Ping Wang y Guoping Li. "Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice". Entropy 25, n.º 8 (2 de agosto de 2023): 1157. http://dx.doi.org/10.3390/e25081157.
Texto completoLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang y Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes". Entropy 25, n.º 8 (2 de agosto de 2023): 1159. http://dx.doi.org/10.3390/e25081159.
Texto completoMuthukumaran V., Manimozhi I., Praveen Sundar P. V., Karthikeyan T. y Magesh Gopu. "Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring". International Journal of e-Collaboration 17, n.º 3 (julio de 2021): 25–45. http://dx.doi.org/10.4018/ijec.2021070102.
Texto completoYang, Qiang y Daofeng Li. "Provably Secure Lattice-Based Self-Certified Signature Scheme". Security and Communication Networks 2021 (31 de diciembre de 2021): 1–9. http://dx.doi.org/10.1155/2021/2459628.
Texto completoFang, Wu Yan, Zheng Huang, Wang Li Cheng y Wen Qiao Yan. "Enhanced Provably Secure NTRU Encryption Based on Hard Learning over Rings". Applied Mechanics and Materials 236-237 (noviembre de 2012): 1139–44. http://dx.doi.org/10.4028/www.scientific.net/amm.236-237.1139.
Texto completoHuixian, Li, Gao Jin, Wang Lingyun y Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme". International Arab Journal of Information Technology 17, n.º 2 (28 de febrero de 2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Texto completoEscribano Pablos, José Ignacio, María Isabel González Vasco, Misael Enrique Marriaga y Ángel Luis Pérez del Pozo. "Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber". Mathematics 8, n.º 10 (21 de octubre de 2020): 1853. http://dx.doi.org/10.3390/math8101853.
Texto completoKaiyang, Guo, Han Yiliang, Wu Riming y Liu Kai. "SACS-ABE&B: Supervised Access Control Scheme Based on Attribute-Based Encryption and Blockchain". Security and Communication Networks 2022 (23 de septiembre de 2022): 1–13. http://dx.doi.org/10.1155/2022/7067812.
Texto completoYang, Nan y Youliang Tian. "Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE". Security and Communication Networks 2023 (3 de enero de 2023): 1–9. http://dx.doi.org/10.1155/2023/3765934.
Texto completoXie, Congge, Jian Weng y Jinming Wen. "Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices". Security and Communication Networks 2020 (14 de enero de 2020): 1–11. http://dx.doi.org/10.1155/2020/1743421.
Texto completoAlagic, Gorjan, Stacey Jeffery, Maris Ozols y Alexander Poremba. "On Quantum Chosen-Ciphertext Attacks and Learning with Errors". Cryptography 4, n.º 1 (21 de marzo de 2020): 10. http://dx.doi.org/10.3390/cryptography4010010.
Texto completoCao, Chengtang, Lin You y Gengran Hu. "Fuzzy Identity-Based Ring Signature from Lattices". Security and Communication Networks 2021 (16 de marzo de 2021): 1–9. http://dx.doi.org/10.1155/2021/6692608.
Texto completoKim, Gyu Chol, Hyon A. Ji, Yong Bok Jong, Gwang Hyok Kim y Hak Su Kim. "Possibility of decryption speed-up by parallel processing in CCA secure hashed ElGamal". PLOS ONE 18, n.º 11 (30 de noviembre de 2023): e0294840. http://dx.doi.org/10.1371/journal.pone.0294840.
Texto completoChen, Taowei, Zhixin Ren, Yimin Yu, Jie Zhu y Jinyi Zhao. "Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain". Applied Sciences 13, n.º 13 (30 de junio de 2023): 7765. http://dx.doi.org/10.3390/app13137765.
Texto completoThanalakshmi, P., N. Anbazhagan, Gyanendra Prasad Joshi y Eunmok Yang. "A quantum resistant universal designated verifier signature proof". AIMS Mathematics 8, n.º 8 (2023): 18234–50. http://dx.doi.org/10.3934/math.2023927.
Texto completoLee, Jaeheung y Yongsu Park. "HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme". Applied Sciences 11, n.º 16 (10 de agosto de 2021): 7350. http://dx.doi.org/10.3390/app11167350.
Texto completoThanalakshmi, P., R. Anitha, N. Anbazhagan, Chulho Park, Gyanendra Prasad Joshi y Changho Seo. "A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme". Mathematics 10, n.º 10 (11 de mayo de 2022): 1642. http://dx.doi.org/10.3390/math10101642.
Texto completoSeyhan, Kübra, Sedat Akleylek y Ahmet Faruk Dursun. "Password authenticated key exchange-based on Kyber for mobile devices". PeerJ Computer Science 10 (29 de marzo de 2024): e1960. http://dx.doi.org/10.7717/peerj-cs.1960.
Texto completoXie, Yi-Yang, Xiu-Bo Chen y Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems". Security and Communication Networks 2022 (1 de septiembre de 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.
Texto completoJiang, Jian, Yulong Gao, Yufei Gong y Zhengtao Jiang. "A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update". Sensors 24, n.º 14 (11 de julio de 2024): 4493. http://dx.doi.org/10.3390/s24144493.
Texto completoGao, Wenhua, Li Yang, Daode Zhang y Xia Liu. "Quantum Identity-Based Encryption from the Learning with Errors Problem". Cryptography 6, n.º 1 (16 de febrero de 2022): 9. http://dx.doi.org/10.3390/cryptography6010009.
Texto completoLiang, Junbin, Jianye Huang, Qiong Huang, Liantao Lan y Man Ho Allen Au. "A Lattice-Based Certificateless Traceable Ring Signature Scheme". Information 14, n.º 3 (2 de marzo de 2023): 160. http://dx.doi.org/10.3390/info14030160.
Texto completoTang, Yongli, Feifei Xia, Qing Ye, Mengyao Wang, Ruijie Mu y Xiaohang Zhang. "Identity-Based Linkable Ring Signature on NTRU Lattice". Security and Communication Networks 2021 (16 de septiembre de 2021): 1–17. http://dx.doi.org/10.1155/2021/9992414.
Texto completoWu, Faguo, Bo Zhou y Xiao Zhang. "Identity-Based Proxy Signature with Message Recovery over NTRU Lattice". Entropy 25, n.º 3 (4 de marzo de 2023): 454. http://dx.doi.org/10.3390/e25030454.
Texto completoYang, Chunli, Shihui Zheng, Licheng Wang, Miaomiao Tian, Lize Gu y Yixian Yang. "A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model". Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/391276.
Texto completoZhang, Lili y Yanqin Ma. "A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model". Mathematical Problems in Engineering 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/307637.
Texto completoJIA, Xiao-Ying, Bao LI y Ya-Min LIU. "Random Oracle Model". Journal of Software 23, n.º 1 (5 de marzo de 2012): 140–51. http://dx.doi.org/10.3724/sp.j.1001.2012.04092.
Texto completoRjaško, Michal. "On Pseudo-Random Oracles". Tatra Mountains Mathematical Publications 53, n.º 1 (1 de diciembre de 2012): 155–87. http://dx.doi.org/10.2478/v10127-012-0045-5.
Texto completo