Статті в журналах з теми "Key encapsulation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Key encapsulation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Yi-Fan Tseng, Yi-Fan Tseng, Zi-Yuan Liu Yi-Fan Tseng, and Raylin Tso Zi-Yuan Liu. "A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism." 網際網路技術學刊 22, no. 5 (September 2021): 1183–95. http://dx.doi.org/10.53106/160792642021092205020.
Повний текст джерелаANADA, Hiroaki, and Seiko ARITA. "Identification Schemes from Key Encapsulation Mechanisms." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95.A, no. 7 (2012): 1136–55. http://dx.doi.org/10.1587/transfun.e95.a.1136.
Повний текст джерелаWu, Jui-Di, Yuh-Min Tseng, Sen-Shan Huang, and Wei-Chieh Chou. "Leakage-Resilient Certificateless Key Encapsulation Scheme." Informatica 29, no. 1 (January 1, 2018): 125–55. http://dx.doi.org/10.15388/informatica.2018.161.
Повний текст джерелаPope, Emily, Bradley Haltli, Russell G. Kerr, and Ali Ahmadi. "Effects of Matrix Composition and Temperature on Viability and Metabolic Activity of Microencapsulated Marine Bacteria." Microorganisms 10, no. 5 (May 10, 2022): 996. http://dx.doi.org/10.3390/microorganisms10050996.
Повний текст джерелаMuhammad Fuad Al Khafiz, Yuanita Hikmahwati, Khairul Anam, and Dwi Hudiyanti. "Key conditions of alpha-tocopherol encapsulation in gum Arabic dispersions." International Journal of Research in Pharmaceutical Sciences 10, no. 4 (October 16, 2019): 2622–27. http://dx.doi.org/10.26452/ijrps.v10i4.1520.
Повний текст джерелаLI, Ji-Guo, Hai-Shan YANG, and Yi-Chen ZHANG. "Certificate-Based Key Encapsulation Mechanism with Tags." Journal of Software 23, no. 8 (September 11, 2012): 2163–72. http://dx.doi.org/10.3724/sp.j.1001.2012.04127.
Повний текст джерелаHANAOKA, Goichiro, Takahiro MATSUDA, and Jacob C. N. SCHULDT. "A New Combiner for Key Encapsulation Mechanisms." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 12 (December 1, 2019): 1668–75. http://dx.doi.org/10.1587/transfun.e102.a.1668.
Повний текст джерелаBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, et al. "DAGS: Key encapsulation using dyadic GS codes." Journal of Mathematical Cryptology 12, no. 4 (December 1, 2018): 221–39. http://dx.doi.org/10.1515/jmc-2018-0027.
Повний текст джерелаManulis, Mark, Bertram Poettering, and Douglas Stebila. "Plaintext awareness in identity-based key encapsulation." International Journal of Information Security 13, no. 1 (November 22, 2013): 25–49. http://dx.doi.org/10.1007/s10207-013-0218-5.
Повний текст джерелаQin, Baodong, Shengli Liu, Shifeng Sun, Robert H. Deng, and Dawu Gu. "Related-key secure key encapsulation from extended computational bilinear Diffie–Hellman." Information Sciences 406-407 (September 2017): 1–11. http://dx.doi.org/10.1016/j.ins.2017.04.018.
Повний текст джерелаLAI, Xin, and Da-Ke HE. "Cryptographic Workflow Key Encapsulation Mechanism Based on Signcryption." Journal of Software 20, no. 10 (November 6, 2009): 2810–21. http://dx.doi.org/10.3724/sp.j.1001.2009.03426.
Повний текст джерелаZhao, Zhan Feng, and Juan Ye. "Design Key Points for High Power LED Encapsulation." Advanced Materials Research 651 (January 2013): 706–9. http://dx.doi.org/10.4028/www.scientific.net/amr.651.706.
Повний текст джерелаLu, Yang, and Jiguo Li. "Efficient constructions of certificate-based key encapsulation mechanism." International Journal of Internet Protocol Technology 8, no. 2/3 (2014): 96. http://dx.doi.org/10.1504/ijipt.2014.066374.
Повний текст джерелаHu, Jingwei, Marco Baldi, Paolo Santini, Neng Zeng, San Ling, and Huaxiong Wang. "Lightweight Key Encapsulation Using LDPC Codes on FPGAs." IEEE Transactions on Computers 69, no. 3 (March 1, 2020): 327–41. http://dx.doi.org/10.1109/tc.2019.2948323.
Повний текст джерелаLutsenko, M. S. "Post-quantum algorithm of Classic McEliece key encapsulation." Radiotekhnika, no. 203 (December 23, 2020): 82–90. http://dx.doi.org/10.30837/rt.2020.4.203.06.
Повний текст джерелаZajac, Pavol. "Ephemeral Keys Authenticated with Merkle Trees and Their Use in IoT Applications." Sensors 21, no. 6 (March 13, 2021): 2036. http://dx.doi.org/10.3390/s21062036.
Повний текст джерелаZhang, Ping, Yamin Li, and Muhua Liu. "An Indistinguishably Secure Function Encryption Scheme." Security and Communication Networks 2019 (November 5, 2019): 1–10. http://dx.doi.org/10.1155/2019/8567534.
Повний текст джерелаMinovski, Blago, Jelena Andrić, Lennart Löfdahl, and Peter Gullberg. "A numerical investigation of thermal engine encapsulation concept for a passenger vehicle and its effect on fuel consumption." Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering 233, no. 3 (January 9, 2018): 557–71. http://dx.doi.org/10.1177/0954407017749074.
Повний текст джерелаYang, Zheng. "On constructing practical multi-recipient key-encapsulation with short ciphertext and public key." Security and Communication Networks 8, no. 18 (September 6, 2015): 4191–202. http://dx.doi.org/10.1002/sec.1334.
Повний текст джерелаPersichetti, Edoardo, Rainer Steinwandt, and Adriana Suárez Corona. "From Key Encapsulation to Authenticated Group Key Establishment—A Compiler for Post-Quantum Primitives †." Entropy 21, no. 12 (November 30, 2019): 1183. http://dx.doi.org/10.3390/e21121183.
Повний текст джерелаAhubele, B. O., and L. U. Oghenekaro. "Secured Electronic Voting System Using RSA Key Encapsulation Mechanism." European Journal of Electrical Engineering and Computer Science 6, no. 2 (April 25, 2022): 81–87. http://dx.doi.org/10.24018/ejece.2022.6.2.427.
Повний текст джерелаLee, Joohee, Duhyeong Kim, Hyungkyu Lee, Younho Lee, and Jung Hee Cheon. "RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices." IEEE Access 7 (2019): 2080–91. http://dx.doi.org/10.1109/access.2018.2884084.
Повний текст джерелаGyöngyvér, Márton. "Cca-Secure Key Encapsulation Mechanism Based on Factoring Assumption." Tatra Mountains Mathematical Publications 53, no. 1 (December 1, 2012): 137–46. http://dx.doi.org/10.2478/v10127-012-0043-7.
Повний текст джерелаSeo, Minhye, Jung Yeon Hwang, Soo-hyung Kim, and Jong Hwan Park. "Biometric Authentication Protocol Using Hidden Vector Key Encapsulation Mechanism." Journal of the Korea Institute of Information Security and Cryptology 26, no. 1 (February 29, 2016): 69–79. http://dx.doi.org/10.13089/jkiisc.2016.26.1.69.
Повний текст джерелаAussignargues, Clément, Bradley C. Paasch, Raul Gonzalez-Esquer, Onur Erbilgin, and Cheryl A. Kerfeld. "Bacterial microcompartment assembly: The key role of encapsulation peptides." Communicative & Integrative Biology 8, no. 3 (May 4, 2015): e1039755. http://dx.doi.org/10.1080/19420889.2015.1039755.
Повний текст джерелаGalindo, David, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala, and Srinivas Vivek. "Implementation of a leakage-resilient ElGamal key encapsulation mechanism." Journal of Cryptographic Engineering 6, no. 3 (February 29, 2016): 229–38. http://dx.doi.org/10.1007/s13389-016-0121-x.
Повний текст джерелаLong, Yu, and Kefei Chen. "Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism." Information Sciences 180, no. 7 (April 2010): 1167–81. http://dx.doi.org/10.1016/j.ins.2009.12.008.
Повний текст джерела赖, 建昌, 欣沂 黄, 德彪 何, and 玮. 伍. "Security analysis of uppercaseSM9 digital signature and key encapsulation." SCIENTIA SINICA Informationis 51, no. 11 (November 1, 2021): 1900. http://dx.doi.org/10.1360/ssi-2021-0049.
Повний текст джерелаYang, Junhan, and Tianjie Cao. "Provably Secure Three-Party Authenticated Key Exchange Based on Certificateless Key Encapsulation Sensor Mechanism." Sensor Letters 11, no. 11 (November 1, 2013): 2141–44. http://dx.doi.org/10.1166/sl.2013.2960.
Повний текст джерелаRudkevich, Dmitry M., and Alexander V. Leontiev. "Molecular Encapsulation of Gases." Australian Journal of Chemistry 57, no. 8 (2004): 713. http://dx.doi.org/10.1071/ch04102.
Повний текст джерелаMurtadza, Siti Afiqah ‘Aisyah, Junaidah Jai, Nurul Asyikin Md Zaki, and Fazlena Hamzah. "Essential oils encapsulation performance evaluation: A review on encapsulation parameters." Malaysian Journal of Chemical Engineering and Technology (MJCET) 4, no. 2 (October 31, 2021): 114. http://dx.doi.org/10.24191/mjcet.v4i2.14481.
Повний текст джерелаGuo, Ya Bei, Hui Yu, Wen Yi Lu, Xiao Feng Jin, and Jiang Bo Zou. "The Influence and Control of Encapsulation Moisture in MEMS Gyroscope." Key Engineering Materials 609-610 (April 2014): 875–78. http://dx.doi.org/10.4028/www.scientific.net/kem.609-610.875.
Повний текст джерелаKim, Taehoon, Wonbin Kim, Daehee Seo, and Imyeong Lee. "Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments." Sensors 21, no. 10 (May 17, 2021): 3474. http://dx.doi.org/10.3390/s21103474.
Повний текст джерелаVlasenko, A. V., M. V. Evsyukov, M. M. Putyato, and A. S. Makaryan. "RESEARCH OF KEY ENCAPSULATION MECHANISMS BASED ON POSTQUANTUM CRYPTOGRAPHIC ALGORITHMS." CASPIAN JOURNAL: Control and High Technologies 48, no. 4 (2019): 121–27. http://dx.doi.org/10.21672/2074-1707.2019.48.4.121-127.
Повний текст джерелаJalali, Amir, Reza Azarderakhsh, Mehran Mozaffari Kermani, Matthew Campagna, and David Jao. "ARMv8 SIKE: Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors." IEEE Transactions on Circuits and Systems I: Regular Papers 66, no. 11 (November 2019): 4209–18. http://dx.doi.org/10.1109/tcsi.2019.2920869.
Повний текст джерелаPark, So Hyun, Suhri Kim, Dong Hoon Lee, and Jong Hwan Park. "Improved Ring LWR-Based Key Encapsulation Mechanism Using Cyclotomic Trinomials." IEEE Access 8 (2020): 112585–97. http://dx.doi.org/10.1109/access.2020.3002223.
Повний текст джерелаPhoon, Jun-Hoe, Wai-Kong Lee, Denis C. K. Wong, Wun-She Yap, Bok-Min Goi, and Raphael C. W. Phan. "Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism." IEEE Internet of Things Journal 7, no. 9 (September 2020): 8513–24. http://dx.doi.org/10.1109/jiot.2020.2991334.
Повний текст джерелаLong, Yu, Xiang-xue Li, Ke-fei Chen, and Xuan Hong. "Distributed certificateless key encapsulation mechanism secure against the adaptive adversary." Journal of Shanghai Jiaotong University (Science) 14, no. 1 (February 2009): 102–6. http://dx.doi.org/10.1007/s12204-009-0102-7.
Повний текст джерелаChoi, Seung Geol, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, and Moti Yung. "The Kurosawa–Desmedt key encapsulation is not chosen-ciphertext secure." Information Processing Letters 109, no. 16 (July 2009): 897–901. http://dx.doi.org/10.1016/j.ipl.2009.04.007.
Повний текст джерелаXu, Shengfeng, and Xiangxue Li. "Chosen-Ciphertext Secure Key Encapsulation Mechanism in the Standard Model." IEEE Access 9 (2021): 13683–90. http://dx.doi.org/10.1109/access.2021.3051047.
Повний текст джерелаGiraldo, Kevin A., Juan Sebastian Bermudez, Carlos E. Torres, Luis H. Reyes, Johann F. Osma, and Juan C. Cruz. "Microfluidics for Multiphase Mixing and Liposomal Encapsulation of Nanobioconjugates: Passive vs. Acoustic Systems." Fluids 6, no. 9 (August 31, 2021): 309. http://dx.doi.org/10.3390/fluids6090309.
Повний текст джерелаVillanueva-Polanco, Ricardo, and Eduardo Angulo-Madrid. "Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism." Applied Sciences 11, no. 1 (December 28, 2020): 193. http://dx.doi.org/10.3390/app11010193.
Повний текст джерелаMontané, Xavier, Anna Bajek, Krzysztof Roszkowski, Josep M. Montornés, Marta Giamberini, Szymon Roszkowski, Oliwia Kowalczyk, Ricard Garcia-Valls, and Bartosz Tylkowski. "Encapsulation for Cancer Therapy." Molecules 25, no. 7 (March 31, 2020): 1605. http://dx.doi.org/10.3390/molecules25071605.
Повний текст джерелаVlasenko, A., M. Evsyukov, M. Putyato, and A. Makaryan. "Decision Support System for Finding an Optimal Postquantum Key Encapsulation Mechanism. Part 1. Decision Making Algorithm." Proceedings of Telecommunication Universities 6, no. 4 (December 2020): 70–79. http://dx.doi.org/10.31854/1813-324x-2020-6-4-70-79.
Повний текст джерелаPARK, Jong Hwan, and Dong Hoon LEE. "Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 329–31. http://dx.doi.org/10.1587/transfun.e92.a.329.
Повний текст джерелаKiltz, Eike, and David Galindo. "Direct chosen-ciphertext secure identity-based key encapsulation without random oracles." Theoretical Computer Science 410, no. 47-49 (November 2009): 5093–111. http://dx.doi.org/10.1016/j.tcs.2009.08.007.
Повний текст джерелаYang, Yang. "Efficient identity-based key encapsulation scheme with wildcards for email systems." International Journal of Communication Systems 27, no. 1 (September 30, 2013): 171–83. http://dx.doi.org/10.1002/dac.2672.
Повний текст джерелаPhoon, Jun-Hoe, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, and Bok-Min Goi. "Area–Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 28, no. 12 (December 2020): 2672–84. http://dx.doi.org/10.1109/tvlsi.2020.3025046.
Повний текст джерелаWu, Jui-Di, Yuh-Min Tseng, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage." IEEE Open Journal of the Computer Society 1 (2020): 131–44. http://dx.doi.org/10.1109/ojcs.2020.3008961.
Повний текст джерелаWei, Puwen, and Yuliang Zheng. "On the Construction of Public Key Encryption with Sender Recovery." International Journal of Foundations of Computer Science 26, no. 01 (January 2015): 1–31. http://dx.doi.org/10.1142/s012905411550001x.
Повний текст джерела