Статті в журналах з теми "Quantum random oracle model"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Quantum random oracle model".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Zhandry, Mark. "Secure identity-based encryption in the quantum random oracle model." International Journal of Quantum Information 13, no. 04 (June 2015): 1550014. http://dx.doi.org/10.1142/s0219749915500148.
Повний текст джерелаShang, Tao, Ranyiliu Chen, and Qi Lei. "Quantum Random Oracle Model for Quantum Public-Key Encryption." IEEE Access 7 (2019): 130024–31. http://dx.doi.org/10.1109/access.2019.2940406.
Повний текст джерелаHarrow, Aram W., and David J. Rosenbaum. "Uselessness for an Oracle model with internal randomness." Quantum Information and Computation 14, no. 7&8 (May 2014): 608–24. http://dx.doi.org/10.26421/qic14.7-8-5.
Повний текст джерелаGama, Mariana, Paulo Mateus, and André Souto. "A Private Quantum Bit String Commitment." Entropy 22, no. 3 (February 27, 2020): 272. http://dx.doi.org/10.3390/e22030272.
Повний текст джерелаGoncalves, Brian, and Atefeh Mashatan. "Tightly Secure PKE Combiner in the Quantum Random Oracle Model." Cryptography 6, no. 2 (March 29, 2022): 15. http://dx.doi.org/10.3390/cryptography6020015.
Повний текст джерелаBanegas, Gustavo, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, et al. "DAGS: Key encapsulation using dyadic GS codes." Journal of Mathematical Cryptology 12, no. 4 (December 1, 2018): 221–39. http://dx.doi.org/10.1515/jmc-2018-0027.
Повний текст джерелаChen, Lijie, and Ramis Movassagh. "Quantum Merkle Trees." Quantum 8 (June 18, 2024): 1380. http://dx.doi.org/10.22331/q-2024-06-18-1380.
Повний текст джерелаKandii, S. O., and I. D. Gorbenko. "Analysis of DSTU 8961:2019 in the quantum random oracle model." Radiotekhnika, no. 214 (September 29, 2023): 7–16. http://dx.doi.org/10.30837/rt.2023.3.214.01.
Повний текст джерелаColadangelo, Andrea, Christian Majenz, and Alexander Poremba. "Quantum copy-protection of compute-and-compare programs in the quantum random oracle model." Quantum 8 (May 2, 2024): 1330. http://dx.doi.org/10.22331/q-2024-05-02-1330.
Повний текст джерелаYan, Jianhua, Licheng Wang, Lihua Wang, Yixian Yang, and Wenbin Yao. "Efficient Lattice-Based Signcryption in Standard Model." Mathematical Problems in Engineering 2013 (2013): 1–18. http://dx.doi.org/10.1155/2013/702539.
Повний текст джерелаKretschmer, William. "The Quantum Supremacy Tsirelson Inequality." Quantum 5 (October 7, 2021): 560. http://dx.doi.org/10.22331/q-2021-10-07-560.
Повний текст джерелаWang, Hao, Yu Li, and Li-Ping Wang. "Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros." Security and Communication Networks 2022 (July 14, 2022): 1–11. http://dx.doi.org/10.1155/2022/9257443.
Повний текст джерелаGorbenko, Yu I., and S. O. Kandii. "Comparison of security arguments of promising key encapsulation mechanisms." Radiotekhnika, no. 210 (September 28, 2022): 22–36. http://dx.doi.org/10.30837/rt.2022.3.210.02.
Повний текст джерелаLi, Fengyin, Yang Cui, Baogui Huang, Siqi Yu, Peiyu Liu, Yilei Wang, and Tao Li. "A Lamus-Based Flight Data Sharing Model on Consortium Blockchain." Security and Communication Networks 2022 (May 9, 2022): 1–11. http://dx.doi.org/10.1155/2022/5717185.
Повний текст джерелаWei, Lulu, Daofeng Li, and Zhiqiang Liu. "Provable Secure Attribute-Based Proxy Signature Over Lattice Small Integer Solution Problem in Random Oracle Model." Electronics 12, no. 7 (March 30, 2023): 1619. http://dx.doi.org/10.3390/electronics12071619.
Повний текст джерелаSharafi, Javad, and Hassan Daghigh. "A Ring-LWE-based digital signature inspired by Lindner–Peikert scheme." Journal of Mathematical Cryptology 16, no. 1 (January 1, 2022): 205–14. http://dx.doi.org/10.1515/jmc-2021-0013.
Повний текст джерелаLi, Quanrun, Chingfang Hsu, Debiao He, Kim-Kwang Raymond Choo, and Peng Gong. "An Identity-Based Blind Signature Scheme Using Lattice with Provable Security." Mathematical Problems in Engineering 2020 (May 11, 2020): 1–12. http://dx.doi.org/10.1155/2020/7528571.
Повний текст джерелаPreethi, Thakkalapally, and Bharat Amberker. "Traceable Signatures using Lattices." International Arab Journal of Information Technology 17, no. 6 (November 1, 2020): 965–75. http://dx.doi.org/10.34028/iajit/17/6/15.
Повний текст джерелаBranco, Pedro. "A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions." Advances in Mathematics of Communications 15, no. 1 (2021): 113–30. http://dx.doi.org/10.3934/amc.2020046.
Повний текст джерелаP. Ravindra, S. Vasu, V. Suresh, and K. Bangaru Lakshmi. "A Study on “Security of Cyber-Physical Systems in the Cloud”." Journal of Advanced Zoology 44, S-5 (November 15, 2023): 2347–64. http://dx.doi.org/10.17762/jaz.v44is-5.1854.
Повний текст джерелаLee, Hakjun. "A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain." Korean Institute of Smart Media 12, no. 2 (March 30, 2023): 76–82. http://dx.doi.org/10.30693/smj.2023.12.2.76.
Повний текст джерелаLai, Qiqi, Bo Yang, Zhe Xia, Yannan Li, Yuan Chen, and Zhenlong Li. "Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 589–606. http://dx.doi.org/10.1142/s0129054119400148.
Повний текст джерелаLi, Fengyin, Mengjiao Yang, Zhihao Song, Ping Wang, and Guoping Li. "Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice." Entropy 25, no. 8 (August 2, 2023): 1157. http://dx.doi.org/10.3390/e25081157.
Повний текст джерелаLi, Fengyin, Junhui Wang, Mengxue Shang, Dandan Zhang, and Tao Li. "Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes." Entropy 25, no. 8 (August 2, 2023): 1159. http://dx.doi.org/10.3390/e25081159.
Повний текст джерелаMuthukumaran V., Manimozhi I., Praveen Sundar P. V., Karthikeyan T., and Magesh Gopu. "Public Key Encryption With Equality Test for Industrial Internet of Things Based on Near-Ring." International Journal of e-Collaboration 17, no. 3 (July 2021): 25–45. http://dx.doi.org/10.4018/ijec.2021070102.
Повний текст джерелаYang, Qiang, and Daofeng Li. "Provably Secure Lattice-Based Self-Certified Signature Scheme." Security and Communication Networks 2021 (December 31, 2021): 1–9. http://dx.doi.org/10.1155/2021/2459628.
Повний текст джерелаFang, Wu Yan, Zheng Huang, Wang Li Cheng, and Wen Qiao Yan. "Enhanced Provably Secure NTRU Encryption Based on Hard Learning over Rings." Applied Mechanics and Materials 236-237 (November 2012): 1139–44. http://dx.doi.org/10.4028/www.scientific.net/amm.236-237.1139.
Повний текст джерелаHuixian, Li, Gao Jin, Wang Lingyun, and Pang Liaojun2. "MPKC-based Threshold Proxy Signcryption Scheme." International Arab Journal of Information Technology 17, no. 2 (February 28, 2019): 196–206. http://dx.doi.org/10.34028/iajit/17/2/7.
Повний текст джерелаEscribano Pablos, José Ignacio, María Isabel González Vasco, Misael Enrique Marriaga, and Ángel Luis Pérez del Pozo. "Compiled Constructions towards Post-Quantum Group Key Exchange: A Design from Kyber." Mathematics 8, no. 10 (October 21, 2020): 1853. http://dx.doi.org/10.3390/math8101853.
Повний текст джерелаKaiyang, Guo, Han Yiliang, Wu Riming, and Liu Kai. "SACS-ABE&B: Supervised Access Control Scheme Based on Attribute-Based Encryption and Blockchain." Security and Communication Networks 2022 (September 23, 2022): 1–13. http://dx.doi.org/10.1155/2022/7067812.
Повний текст джерелаYang, Nan, and Youliang Tian. "Identity-Based Unidirectional Collusion-Resistant Proxy Re-Encryption from U-LWE." Security and Communication Networks 2023 (January 3, 2023): 1–9. http://dx.doi.org/10.1155/2023/3765934.
Повний текст джерелаXie, Congge, Jian Weng, and Jinming Wen. "Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices." Security and Communication Networks 2020 (January 14, 2020): 1–11. http://dx.doi.org/10.1155/2020/1743421.
Повний текст джерелаAlagic, Gorjan, Stacey Jeffery, Maris Ozols, and Alexander Poremba. "On Quantum Chosen-Ciphertext Attacks and Learning with Errors." Cryptography 4, no. 1 (March 21, 2020): 10. http://dx.doi.org/10.3390/cryptography4010010.
Повний текст джерелаCao, Chengtang, Lin You, and Gengran Hu. "Fuzzy Identity-Based Ring Signature from Lattices." Security and Communication Networks 2021 (March 16, 2021): 1–9. http://dx.doi.org/10.1155/2021/6692608.
Повний текст джерелаKim, Gyu Chol, Hyon A. Ji, Yong Bok Jong, Gwang Hyok Kim, and Hak Su Kim. "Possibility of decryption speed-up by parallel processing in CCA secure hashed ElGamal." PLOS ONE 18, no. 11 (November 30, 2023): e0294840. http://dx.doi.org/10.1371/journal.pone.0294840.
Повний текст джерелаChen, Taowei, Zhixin Ren, Yimin Yu, Jie Zhu, and Jinyi Zhao. "Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain." Applied Sciences 13, no. 13 (June 30, 2023): 7765. http://dx.doi.org/10.3390/app13137765.
Повний текст джерелаThanalakshmi, P., N. Anbazhagan, Gyanendra Prasad Joshi, and Eunmok Yang. "A quantum resistant universal designated verifier signature proof." AIMS Mathematics 8, no. 8 (2023): 18234–50. http://dx.doi.org/10.3934/math.2023927.
Повний текст джерелаLee, Jaeheung, and Yongsu Park. "HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme." Applied Sciences 11, no. 16 (August 10, 2021): 7350. http://dx.doi.org/10.3390/app11167350.
Повний текст джерелаThanalakshmi, P., R. Anitha, N. Anbazhagan, Chulho Park, Gyanendra Prasad Joshi, and Changho Seo. "A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme." Mathematics 10, no. 10 (May 11, 2022): 1642. http://dx.doi.org/10.3390/math10101642.
Повний текст джерелаSeyhan, Kübra, Sedat Akleylek, and Ahmet Faruk Dursun. "Password authenticated key exchange-based on Kyber for mobile devices." PeerJ Computer Science 10 (March 29, 2024): e1960. http://dx.doi.org/10.7717/peerj-cs.1960.
Повний текст джерелаXie, Yi-Yang, Xiu-Bo Chen, and Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems." Security and Communication Networks 2022 (September 1, 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.
Повний текст джерелаJiang, Jian, Yulong Gao, Yufei Gong, and Zhengtao Jiang. "A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update." Sensors 24, no. 14 (July 11, 2024): 4493. http://dx.doi.org/10.3390/s24144493.
Повний текст джерелаGao, Wenhua, Li Yang, Daode Zhang, and Xia Liu. "Quantum Identity-Based Encryption from the Learning with Errors Problem." Cryptography 6, no. 1 (February 16, 2022): 9. http://dx.doi.org/10.3390/cryptography6010009.
Повний текст джерелаLiang, Junbin, Jianye Huang, Qiong Huang, Liantao Lan, and Man Ho Allen Au. "A Lattice-Based Certificateless Traceable Ring Signature Scheme." Information 14, no. 3 (March 2, 2023): 160. http://dx.doi.org/10.3390/info14030160.
Повний текст джерелаTang, Yongli, Feifei Xia, Qing Ye, Mengyao Wang, Ruijie Mu, and Xiaohang Zhang. "Identity-Based Linkable Ring Signature on NTRU Lattice." Security and Communication Networks 2021 (September 16, 2021): 1–17. http://dx.doi.org/10.1155/2021/9992414.
Повний текст джерелаWu, Faguo, Bo Zhou, and Xiao Zhang. "Identity-Based Proxy Signature with Message Recovery over NTRU Lattice." Entropy 25, no. 3 (March 4, 2023): 454. http://dx.doi.org/10.3390/e25030454.
Повний текст джерелаYang, Chunli, Shihui Zheng, Licheng Wang, Miaomiao Tian, Lize Gu, and Yixian Yang. "A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/391276.
Повний текст джерелаZhang, Lili, and Yanqin Ma. "A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model." Mathematical Problems in Engineering 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/307637.
Повний текст джерелаJIA, Xiao-Ying, Bao LI, and Ya-Min LIU. "Random Oracle Model." Journal of Software 23, no. 1 (March 5, 2012): 140–51. http://dx.doi.org/10.3724/sp.j.1001.2012.04092.
Повний текст джерелаRjaško, Michal. "On Pseudo-Random Oracles." Tatra Mountains Mathematical Publications 53, no. 1 (December 1, 2012): 155–87. http://dx.doi.org/10.2478/v10127-012-0045-5.
Повний текст джерела