Artigos de revistas sobre o tema "Quantum random oracle model"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Quantum random oracle model".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Zhandry, Mark. "Secure identity-based encryption in the quantum random oracle model". International Journal of Quantum Information 13, n.º 04 (junho de 2015): 1550014. http://dx.doi.org/10.1142/s0219749915500148.
Texto completo da fonteShang, Tao, Ranyiliu Chen e Qi Lei. "Quantum Random Oracle Model for Quantum Public-Key Encryption". IEEE Access 7 (2019): 130024–31. http://dx.doi.org/10.1109/access.2019.2940406.
Texto completo da fonteHarrow, Aram W., e David J. Rosenbaum. "Uselessness for an Oracle model with internal randomness". Quantum Information and Computation 14, n.º 7&8 (maio de 2014): 608–24. http://dx.doi.org/10.26421/qic14.7-8-5.
Texto completo da fonteGama, Mariana, Paulo Mateus e André Souto. "A Private Quantum Bit String Commitment". Entropy 22, n.º 3 (27 de fevereiro de 2020): 272. http://dx.doi.org/10.3390/e22030272.
Texto completo da fonteGoncalves, Brian, e Atefeh Mashatan. "Tightly Secure PKE Combiner in the Quantum Random Oracle Model". Cryptography 6, n.º 2 (29 de março de 2022): 15. http://dx.doi.org/10.3390/cryptography6020015.
Texto completo da fonteBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye et al. "DAGS: Key encapsulation using dyadic GS codes". Journal of Mathematical Cryptology 12, n.º 4 (1 de dezembro de 2018): 221–39. http://dx.doi.org/10.1515/jmc-2018-0027.
Texto completo da fonteChen, Lijie, e Ramis Movassagh. "Quantum Merkle Trees". Quantum 8 (18 de junho de 2024): 1380. http://dx.doi.org/10.22331/q-2024-06-18-1380.
Texto completo da fonteKandii, S. O., e I. D. Gorbenko. "Analysis of DSTU 8961:2019 in the quantum random oracle model". Radiotekhnika, n.º 214 (29 de setembro de 2023): 7–16. http://dx.doi.org/10.30837/rt.2023.3.214.01.
Texto completo da fonteColadangelo, Andrea, Christian Majenz e Alexander Poremba. "Quantum copy-protection of compute-and-compare programs in the quantum random oracle model". Quantum 8 (2 de maio de 2024): 1330. http://dx.doi.org/10.22331/q-2024-05-02-1330.
Texto completo da fonteYan, Jianhua, Licheng Wang, Lihua Wang, Yixian Yang e Wenbin Yao. "Efficient Lattice-Based Signcryption in Standard Model". Mathematical Problems in Engineering 2013 (2013): 1–18. http://dx.doi.org/10.1155/2013/702539.
Texto completo da fonteKretschmer, William. "The Quantum Supremacy Tsirelson Inequality". Quantum 5 (7 de outubro de 2021): 560. http://dx.doi.org/10.22331/q-2021-10-07-560.
Texto completo da fonteWang, Hao, Yu Li e Li-Ping Wang. "Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros". Security and Communication Networks 2022 (14 de julho de 2022): 1–11. http://dx.doi.org/10.1155/2022/9257443.
Texto completo da fonteGorbenko, Yu I., e S. O. Kandii. "Comparison of security arguments of promising key encapsulation mechanisms". Radiotekhnika, n.º 210 (28 de setembro de 2022): 22–36. http://dx.doi.org/10.30837/rt.2022.3.210.02.
Texto completo da fonteLi, Fengyin, Yang Cui, Baogui Huang, Siqi Yu, Peiyu Liu, Yilei Wang e Tao Li. "A Lamus-Based Flight Data Sharing Model on Consortium Blockchain". Security and Communication Networks 2022 (9 de maio de 2022): 1–11. http://dx.doi.org/10.1155/2022/5717185.
Texto completo da fonteWei, Lulu, Daofeng Li e Zhiqiang Liu. "Provable Secure Attribute-Based Proxy Signature Over Lattice Small Integer Solution Problem in Random Oracle Model". Electronics 12, n.º 7 (30 de março de 2023): 1619. http://dx.doi.org/10.3390/electronics12071619.
Texto completo da fonteSharafi, Javad, e Hassan Daghigh. "A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme". Journal of Mathematical Cryptology 16, n.º 1 (1 de janeiro de 2022): 205–14. http://dx.doi.org/10.1515/jmc-2021-0013.
Texto completo da fonteLi, Quanrun, Chingfang Hsu, Debiao He, Kim-Kwang Raymond Choo e Peng Gong. "An Identity-Based Blind Signature Scheme Using Lattice with Provable Security". Mathematical Problems in Engineering 2020 (11 de maio de 2020): 1–12. http://dx.doi.org/10.1155/2020/7528571.
Texto completo da fontePreethi, Thakkalapally, e Bharat Amberker. "Traceable Signatures using Lattices". International Arab Journal of Information Technology 17, n.º 6 (1 de novembro de 2020): 965–75. http://dx.doi.org/10.34028/iajit/17/6/15.
Texto completo da fonteBranco, Pedro. "A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions". Advances in Mathematics of Communications 15, n.º 1 (2021): 113–30. http://dx.doi.org/10.3934/amc.2020046.
Texto completo da fonteP. Ravindra, S. Vasu, V. Suresh e K. Bangaru Lakshmi. "A Study on “Security of Cyber-Physical Systems in the Cloud”". Journal of Advanced Zoology 44, S-5 (15 de novembro de 2023): 2347–64. http://dx.doi.org/10.17762/jaz.v44is-5.1854.
Texto completo da fonteLee, Hakjun. "A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain". Korean Institute of Smart Media 12, n.º 2 (30 de março de 2023): 76–82. http://dx.doi.org/10.30693/smj.2023.12.2.76.
Texto completo da fonteLai, Qiqi, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen e Zhenlong Li. "Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model". International Journal of Foundations of Computer Science 30, n.º 04 (junho de 2019): 589–606. http://dx.doi.org/10.1142/s0129054119400148.
Texto completo da fonteLi, Fengyin, Mengjiao Yang, Zhihao Song, Ping Wang e Guoping Li. "Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice". Entropy 25, n.º 8 (2 de agosto de 2023): 1157. http://dx.doi.org/10.3390/e25081157.
Texto completo da fonteLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang e Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes". Entropy 25, n.º 8 (2 de agosto de 2023): 1159. http://dx.doi.org/10.3390/e25081159.
Texto completo da fonteMuthukumaran V., Manimozhi I., Praveen Sundar P. V., Karthikeyan T. e Magesh Gopu. "Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring". International Journal of e-Collaboration 17, n.º 3 (julho de 2021): 25–45. http://dx.doi.org/10.4018/ijec.2021070102.
Texto completo da fonteYang, Qiang, e Daofeng Li. "Provably Secure Lattice-Based Self-Certified Signature Scheme". Security and Communication Networks 2021 (31 de dezembro de 2021): 1–9. http://dx.doi.org/10.1155/2021/2459628.
Texto completo da fonteFang, Wu Yan, Zheng Huang, Wang Li Cheng e Wen Qiao Yan. "Enhanced Provably Secure NTRU Encryption Based on Hard Learning over Rings". Applied Mechanics and Materials 236-237 (novembro de 2012): 1139–44. http://dx.doi.org/10.4028/www.scientific.net/amm.236-237.1139.
Texto completo da fonteHuixian, Li, Gao Jin, Wang Lingyun e Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme". International Arab Journal of Information Technology 17, n.º 2 (28 de fevereiro de 2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Texto completo da fonteEscribano Pablos, José Ignacio, María Isabel González Vasco, Misael Enrique Marriaga e Ángel Luis Pérez del Pozo. "Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber". Mathematics 8, n.º 10 (21 de outubro de 2020): 1853. http://dx.doi.org/10.3390/math8101853.
Texto completo da fonteKaiyang, Guo, Han Yiliang, Wu Riming e Liu Kai. "SACS-ABE&B: Supervised Access Control Scheme Based on Attribute-Based Encryption and Blockchain". Security and Communication Networks 2022 (23 de setembro de 2022): 1–13. http://dx.doi.org/10.1155/2022/7067812.
Texto completo da fonteYang, Nan, e Youliang Tian. "Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE". Security and Communication Networks 2023 (3 de janeiro de 2023): 1–9. http://dx.doi.org/10.1155/2023/3765934.
Texto completo da fonteXie, Congge, Jian Weng e Jinming Wen. "Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices". Security and Communication Networks 2020 (14 de janeiro de 2020): 1–11. http://dx.doi.org/10.1155/2020/1743421.
Texto completo da fonteAlagic, Gorjan, Stacey Jeffery, Maris Ozols e Alexander Poremba. "On Quantum Chosen-Ciphertext Attacks and Learning with Errors". Cryptography 4, n.º 1 (21 de março de 2020): 10. http://dx.doi.org/10.3390/cryptography4010010.
Texto completo da fonteCao, Chengtang, Lin You e Gengran Hu. "Fuzzy Identity-Based Ring Signature from Lattices". Security and Communication Networks 2021 (16 de março de 2021): 1–9. http://dx.doi.org/10.1155/2021/6692608.
Texto completo da fonteKim, Gyu Chol, Hyon A. Ji, Yong Bok Jong, Gwang Hyok Kim e Hak Su Kim. "Possibility of decryption speed-up by parallel processing in CCA secure hashed ElGamal". PLOS ONE 18, n.º 11 (30 de novembro de 2023): e0294840. http://dx.doi.org/10.1371/journal.pone.0294840.
Texto completo da fonteChen, Taowei, Zhixin Ren, Yimin Yu, Jie Zhu e Jinyi Zhao. "Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain". Applied Sciences 13, n.º 13 (30 de junho de 2023): 7765. http://dx.doi.org/10.3390/app13137765.
Texto completo da fonteThanalakshmi, P., N. Anbazhagan, Gyanendra Prasad Joshi e Eunmok Yang. "A quantum resistant universal designated verifier signature proof". AIMS Mathematics 8, n.º 8 (2023): 18234–50. http://dx.doi.org/10.3934/math.2023927.
Texto completo da fonteLee, Jaeheung, e Yongsu Park. "HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme". Applied Sciences 11, n.º 16 (10 de agosto de 2021): 7350. http://dx.doi.org/10.3390/app11167350.
Texto completo da fonteThanalakshmi, P., R. Anitha, N. Anbazhagan, Chulho Park, Gyanendra Prasad Joshi e Changho Seo. "A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme". Mathematics 10, n.º 10 (11 de maio de 2022): 1642. http://dx.doi.org/10.3390/math10101642.
Texto completo da fonteSeyhan, Kübra, Sedat Akleylek e Ahmet Faruk Dursun. "Password authenticated key exchange-based on Kyber for mobile devices". PeerJ Computer Science 10 (29 de março de 2024): e1960. http://dx.doi.org/10.7717/peerj-cs.1960.
Texto completo da fonteXie, Yi-Yang, Xiu-Bo Chen e Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems". Security and Communication Networks 2022 (1 de setembro de 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.
Texto completo da fonteJiang, Jian, Yulong Gao, Yufei Gong e Zhengtao Jiang. "A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update". Sensors 24, n.º 14 (11 de julho de 2024): 4493. http://dx.doi.org/10.3390/s24144493.
Texto completo da fonteGao, Wenhua, Li Yang, Daode Zhang e Xia Liu. "Quantum Identity-Based Encryption from the Learning with Errors Problem". Cryptography 6, n.º 1 (16 de fevereiro de 2022): 9. http://dx.doi.org/10.3390/cryptography6010009.
Texto completo da fonteLiang, Junbin, Jianye Huang, Qiong Huang, Liantao Lan e Man Ho Allen Au. "A Lattice-Based Certificateless Traceable Ring Signature Scheme". Information 14, n.º 3 (2 de março de 2023): 160. http://dx.doi.org/10.3390/info14030160.
Texto completo da fonteTang, Yongli, Feifei Xia, Qing Ye, Mengyao Wang, Ruijie Mu e Xiaohang Zhang. "Identity-Based Linkable Ring Signature on NTRU Lattice". Security and Communication Networks 2021 (16 de setembro de 2021): 1–17. http://dx.doi.org/10.1155/2021/9992414.
Texto completo da fonteWu, Faguo, Bo Zhou e Xiao Zhang. "Identity-Based Proxy Signature with Message Recovery over NTRU Lattice". Entropy 25, n.º 3 (4 de março de 2023): 454. http://dx.doi.org/10.3390/e25030454.
Texto completo da fonteYang, Chunli, Shihui Zheng, Licheng Wang, Miaomiao Tian, Lize Gu e Yixian Yang. "A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model". Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/391276.
Texto completo da fonteZhang, Lili, e Yanqin Ma. "A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model". Mathematical Problems in Engineering 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/307637.
Texto completo da fonteJIA, Xiao-Ying, Bao LI e Ya-Min LIU. "Random Oracle Model". Journal of Software 23, n.º 1 (5 de março de 2012): 140–51. http://dx.doi.org/10.3724/sp.j.1001.2012.04092.
Texto completo da fonteRjaško, Michal. "On Pseudo-Random Oracles". Tatra Mountains Mathematical Publications 53, n.º 1 (1 de dezembro de 2012): 155–87. http://dx.doi.org/10.2478/v10127-012-0045-5.
Texto completo da fonte