Articoli di riviste sul tema "Quantum random oracle model"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Quantum random oracle model".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Zhandry, Mark. "Secure identity-based encryption in the quantum random oracle model". International Journal of Quantum Information 13, n. 04 (giugno 2015): 1550014. http://dx.doi.org/10.1142/s0219749915500148.
Testo completoShang, Tao, Ranyiliu Chen e Qi Lei. "Quantum Random Oracle Model for Quantum Public-Key Encryption". IEEE Access 7 (2019): 130024–31. http://dx.doi.org/10.1109/access.2019.2940406.
Testo completoHarrow, Aram W., e David J. Rosenbaum. "Uselessness for an Oracle model with internal randomness". Quantum Information and Computation 14, n. 7&8 (maggio 2014): 608–24. http://dx.doi.org/10.26421/qic14.7-8-5.
Testo completoGama, Mariana, Paulo Mateus e André Souto. "A Private Quantum Bit String Commitment". Entropy 22, n. 3 (27 febbraio 2020): 272. http://dx.doi.org/10.3390/e22030272.
Testo completoGoncalves, Brian, e Atefeh Mashatan. "Tightly Secure PKE Combiner in the Quantum Random Oracle Model". Cryptography 6, n. 2 (29 marzo 2022): 15. http://dx.doi.org/10.3390/cryptography6020015.
Testo completoBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye et al. "DAGS: Key encapsulation using dyadic GS codes". Journal of Mathematical Cryptology 12, n. 4 (1 dicembre 2018): 221–39. http://dx.doi.org/10.1515/jmc-2018-0027.
Testo completoChen, Lijie, e Ramis Movassagh. "Quantum Merkle Trees". Quantum 8 (18 giugno 2024): 1380. http://dx.doi.org/10.22331/q-2024-06-18-1380.
Testo completoKandii, S. O., e I. D. Gorbenko. "Analysis of DSTU 8961:2019 in the quantum random oracle model". Radiotekhnika, n. 214 (29 settembre 2023): 7–16. http://dx.doi.org/10.30837/rt.2023.3.214.01.
Testo completoColadangelo, Andrea, Christian Majenz e Alexander Poremba. "Quantum copy-protection of compute-and-compare programs in the quantum random oracle model". Quantum 8 (2 maggio 2024): 1330. http://dx.doi.org/10.22331/q-2024-05-02-1330.
Testo completoYan, Jianhua, Licheng Wang, Lihua Wang, Yixian Yang e Wenbin Yao. "Efficient Lattice-Based Signcryption in Standard Model". Mathematical Problems in Engineering 2013 (2013): 1–18. http://dx.doi.org/10.1155/2013/702539.
Testo completoKretschmer, William. "The Quantum Supremacy Tsirelson Inequality". Quantum 5 (7 ottobre 2021): 560. http://dx.doi.org/10.22331/q-2021-10-07-560.
Testo completoWang, Hao, Yu Li e Li-Ping Wang. "Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros". Security and Communication Networks 2022 (14 luglio 2022): 1–11. http://dx.doi.org/10.1155/2022/9257443.
Testo completoGorbenko, Yu I., e S. O. Kandii. "Comparison of security arguments of promising key encapsulation mechanisms". Radiotekhnika, n. 210 (28 settembre 2022): 22–36. http://dx.doi.org/10.30837/rt.2022.3.210.02.
Testo completoLi, Fengyin, Yang Cui, Baogui Huang, Siqi Yu, Peiyu Liu, Yilei Wang e Tao Li. "A Lamus-Based Flight Data Sharing Model on Consortium Blockchain". Security and Communication Networks 2022 (9 maggio 2022): 1–11. http://dx.doi.org/10.1155/2022/5717185.
Testo completoWei, Lulu, Daofeng Li e Zhiqiang Liu. "Provable Secure Attribute-Based Proxy Signature Over Lattice Small Integer Solution Problem in Random Oracle Model". Electronics 12, n. 7 (30 marzo 2023): 1619. http://dx.doi.org/10.3390/electronics12071619.
Testo completoSharafi, Javad, e Hassan Daghigh. "A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme". Journal of Mathematical Cryptology 16, n. 1 (1 gennaio 2022): 205–14. http://dx.doi.org/10.1515/jmc-2021-0013.
Testo completoLi, Quanrun, Chingfang Hsu, Debiao He, Kim-Kwang Raymond Choo e Peng Gong. "An Identity-Based Blind Signature Scheme Using Lattice with Provable Security". Mathematical Problems in Engineering 2020 (11 maggio 2020): 1–12. http://dx.doi.org/10.1155/2020/7528571.
Testo completoPreethi, Thakkalapally, e Bharat Amberker. "Traceable Signatures using Lattices". International Arab Journal of Information Technology 17, n. 6 (1 novembre 2020): 965–75. http://dx.doi.org/10.34028/iajit/17/6/15.
Testo completoBranco, Pedro. "A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions". Advances in Mathematics of Communications 15, n. 1 (2021): 113–30. http://dx.doi.org/10.3934/amc.2020046.
Testo completoP. Ravindra, S. Vasu, V. Suresh e K. Bangaru Lakshmi. "A Study on “Security of Cyber-Physical Systems in the Cloud”". Journal of Advanced Zoology 44, S-5 (15 novembre 2023): 2347–64. http://dx.doi.org/10.17762/jaz.v44is-5.1854.
Testo completoLee, Hakjun. "A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain". Korean Institute of Smart Media 12, n. 2 (30 marzo 2023): 76–82. http://dx.doi.org/10.30693/smj.2023.12.2.76.
Testo completoLai, Qiqi, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen e Zhenlong Li. "Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model". International Journal of Foundations of Computer Science 30, n. 04 (giugno 2019): 589–606. http://dx.doi.org/10.1142/s0129054119400148.
Testo completoLi, Fengyin, Mengjiao Yang, Zhihao Song, Ping Wang e Guoping Li. "Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice". Entropy 25, n. 8 (2 agosto 2023): 1157. http://dx.doi.org/10.3390/e25081157.
Testo completoLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang e Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes". Entropy 25, n. 8 (2 agosto 2023): 1159. http://dx.doi.org/10.3390/e25081159.
Testo completoMuthukumaran V., Manimozhi I., Praveen Sundar P. V., Karthikeyan T. e Magesh Gopu. "Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring". International Journal of e-Collaboration 17, n. 3 (luglio 2021): 25–45. http://dx.doi.org/10.4018/ijec.2021070102.
Testo completoYang, Qiang, e Daofeng Li. "Provably Secure Lattice-Based Self-Certified Signature Scheme". Security and Communication Networks 2021 (31 dicembre 2021): 1–9. http://dx.doi.org/10.1155/2021/2459628.
Testo completoFang, Wu Yan, Zheng Huang, Wang Li Cheng e Wen Qiao Yan. "Enhanced Provably Secure NTRU Encryption Based on Hard Learning over Rings". Applied Mechanics and Materials 236-237 (novembre 2012): 1139–44. http://dx.doi.org/10.4028/www.scientific.net/amm.236-237.1139.
Testo completoHuixian, Li, Gao Jin, Wang Lingyun e Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme". International Arab Journal of Information Technology 17, n. 2 (28 febbraio 2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Testo completoEscribano Pablos, José Ignacio, María Isabel González Vasco, Misael Enrique Marriaga e Ángel Luis Pérez del Pozo. "Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber". Mathematics 8, n. 10 (21 ottobre 2020): 1853. http://dx.doi.org/10.3390/math8101853.
Testo completoKaiyang, Guo, Han Yiliang, Wu Riming e Liu Kai. "SACS-ABE&B: Supervised Access Control Scheme Based on Attribute-Based Encryption and Blockchain". Security and Communication Networks 2022 (23 settembre 2022): 1–13. http://dx.doi.org/10.1155/2022/7067812.
Testo completoYang, Nan, e Youliang Tian. "Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE". Security and Communication Networks 2023 (3 gennaio 2023): 1–9. http://dx.doi.org/10.1155/2023/3765934.
Testo completoXie, Congge, Jian Weng e Jinming Wen. "Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices". Security and Communication Networks 2020 (14 gennaio 2020): 1–11. http://dx.doi.org/10.1155/2020/1743421.
Testo completoAlagic, Gorjan, Stacey Jeffery, Maris Ozols e Alexander Poremba. "On Quantum Chosen-Ciphertext Attacks and Learning with Errors". Cryptography 4, n. 1 (21 marzo 2020): 10. http://dx.doi.org/10.3390/cryptography4010010.
Testo completoCao, Chengtang, Lin You e Gengran Hu. "Fuzzy Identity-Based Ring Signature from Lattices". Security and Communication Networks 2021 (16 marzo 2021): 1–9. http://dx.doi.org/10.1155/2021/6692608.
Testo completoKim, Gyu Chol, Hyon A. Ji, Yong Bok Jong, Gwang Hyok Kim e Hak Su Kim. "Possibility of decryption speed-up by parallel processing in CCA secure hashed ElGamal". PLOS ONE 18, n. 11 (30 novembre 2023): e0294840. http://dx.doi.org/10.1371/journal.pone.0294840.
Testo completoChen, Taowei, Zhixin Ren, Yimin Yu, Jie Zhu e Jinyi Zhao. "Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain". Applied Sciences 13, n. 13 (30 giugno 2023): 7765. http://dx.doi.org/10.3390/app13137765.
Testo completoThanalakshmi, P., N. Anbazhagan, Gyanendra Prasad Joshi e Eunmok Yang. "A quantum resistant universal designated verifier signature proof". AIMS Mathematics 8, n. 8 (2023): 18234–50. http://dx.doi.org/10.3934/math.2023927.
Testo completoLee, Jaeheung, e Yongsu Park. "HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme". Applied Sciences 11, n. 16 (10 agosto 2021): 7350. http://dx.doi.org/10.3390/app11167350.
Testo completoThanalakshmi, P., R. Anitha, N. Anbazhagan, Chulho Park, Gyanendra Prasad Joshi e Changho Seo. "A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme". Mathematics 10, n. 10 (11 maggio 2022): 1642. http://dx.doi.org/10.3390/math10101642.
Testo completoSeyhan, Kübra, Sedat Akleylek e Ahmet Faruk Dursun. "Password authenticated key exchange-based on Kyber for mobile devices". PeerJ Computer Science 10 (29 marzo 2024): e1960. http://dx.doi.org/10.7717/peerj-cs.1960.
Testo completoXie, Yi-Yang, Xiu-Bo Chen e Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems". Security and Communication Networks 2022 (1 settembre 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.
Testo completoJiang, Jian, Yulong Gao, Yufei Gong e Zhengtao Jiang. "A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update". Sensors 24, n. 14 (11 luglio 2024): 4493. http://dx.doi.org/10.3390/s24144493.
Testo completoGao, Wenhua, Li Yang, Daode Zhang e Xia Liu. "Quantum Identity-Based Encryption from the Learning with Errors Problem". Cryptography 6, n. 1 (16 febbraio 2022): 9. http://dx.doi.org/10.3390/cryptography6010009.
Testo completoLiang, Junbin, Jianye Huang, Qiong Huang, Liantao Lan e Man Ho Allen Au. "A Lattice-Based Certificateless Traceable Ring Signature Scheme". Information 14, n. 3 (2 marzo 2023): 160. http://dx.doi.org/10.3390/info14030160.
Testo completoTang, Yongli, Feifei Xia, Qing Ye, Mengyao Wang, Ruijie Mu e Xiaohang Zhang. "Identity-Based Linkable Ring Signature on NTRU Lattice". Security and Communication Networks 2021 (16 settembre 2021): 1–17. http://dx.doi.org/10.1155/2021/9992414.
Testo completoWu, Faguo, Bo Zhou e Xiao Zhang. "Identity-Based Proxy Signature with Message Recovery over NTRU Lattice". Entropy 25, n. 3 (4 marzo 2023): 454. http://dx.doi.org/10.3390/e25030454.
Testo completoYang, Chunli, Shihui Zheng, Licheng Wang, Miaomiao Tian, Lize Gu e Yixian Yang. "A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model". Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/391276.
Testo completoZhang, Lili, e Yanqin Ma. "A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model". Mathematical Problems in Engineering 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/307637.
Testo completoJIA, Xiao-Ying, Bao LI e Ya-Min LIU. "Random Oracle Model". Journal of Software 23, n. 1 (5 marzo 2012): 140–51. http://dx.doi.org/10.3724/sp.j.1001.2012.04092.
Testo completoRjaško, Michal. "On Pseudo-Random Oracles". Tatra Mountains Mathematical Publications 53, n. 1 (1 dicembre 2012): 155–87. http://dx.doi.org/10.2478/v10127-012-0045-5.
Testo completo