为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. Card-Based Cryptographic Protocols for Three-Input Functions with a Standard Deck of Cards Using Private Operations NSTL国家科技图书文献中心
Naoki Kobayashi | Yoshifumi Manabe - 《Computer Security,Part I》 - European Symposium on Research in Computer Security | International Workshop on Data Privacy Management | International Workshop on Cryptocurrencies and Blockchain Technology | International Workshop on the Security of Industrial Control Systems and of Cyber-Physical Systems - 2025, - 94~111 - 共18页
2. Quantum cryptographic protocols with dual messaging system via 2D alternate quantum walk of a genuine single-photon entangled state NSTL国家科技图书文献中心
Panda, Dinesh Kumar | Benjamin, Colin - 《Journal of physics,A.Mathematical and theoretical》 - 2025,58(1) - 共19页
3. Toward a Universal Cryptographic Accelerator NSTL国家科技图书文献中心
Srinivas Devadas | Daniel Sanchez - 《Computer》 - 2025,58(1) - 105~108 - 共4页
4. Cryptographic Cryptid Protocols How to Play Cryptid with Cheaters NSTL国家科技图书文献中心
Xavier Bultel | Charlene Jojon... - 《Cryptology and Network Security,Part I》 - International Conference on Cryptology and Network Security - 2025, - 26~48 - 共23页
5. Communication lower bounds for cryptographic broadcast protocols NSTL国家科技图书文献中心
Erica Blum | Elette Boyle... - 《Distributed computing》 - 2025,38(1) - 1~17 - 共17页
6. Limitations of Wrapping Protocols and TLS Channel Bindings: Formal-Methods Analysis of the Session Binding Proxy Protocol NSTL国家科技图书文献中心
Enis Golaszewski | Edward Zieglar... - 《Security Standardisation Research》 - International Conference on Security Standardisation Research - 2025, - 81~119 - 共39页
7. Batch Array Codes NSTL国家科技图书文献中心
Xiangliang Kong | Chen Wang... - 《IEEE Transactions on Information Theory》 - 2025,71(2) - 936~954 - 共19页
8. Formal Verification of Forward Secrecy and Post-Compromise Security for TreeKEM NSTL国家科技图书文献中心
Alex J. Washburn | Subash Shankar - 《Formal Methods》 - Brazilian Symposium on Formal Methods - 2025, - 155~170 - 共16页
9. Share the MAYO: Thresholdizing MAYO NSTL国家科技图书文献中心
Sofia Celi | Daniel Escudero... - 《Post-Quantum Cryptography,Part I》 - International Conference on Post-Quantum Cryptography - 2025, - 165~198 - 共34页
10. Efficient quantum algorithms to break group ring cryptosystems NSTL国家科技图书文献中心
Ann Dooms | Carlo Emerencia - 《Journal of information security and applications》 - 2025,88(Feb.) - 103923.1~103923.5 - 共5页
服务站
成员单位
友情链接