Citation Details

Book

Codes, Cryptology and Information Security

2019, Volume 11445

ISBN : 978-3-030-16457-7

69 Items cite this Book and its Chapters

Page: 1 | 2 | 3 | > | >>

Article

Computational Hardness of the Permuted Kernel and Subcode Equivalence Problems

Paolo Santini, Marco Baldi and Franco Chiaraluce

Journal: IEEE Transactions on Information Theory, 2024, Volume 70, Number 3, Page 2254

Read Online

Article

Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems

Nabil Moukafih, Ghizlane Orhanou and Said El Hajji

Journal: Security and Communication Networks, 2020, Volume 2020, Page 1

Read Online

Article

Power side-channel leakage assessment and locating the exact sources of leakage at the early stages of ASIC design process

Vahhab Samadi Bokharaie and Ali Jahanian

Journal: The Journal of Supercomputing, 2022, Volume 78, Number 2, Page 2219

Read Online

Article

A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications

Qiang Wang, Fucai Zhou, Jian Xu and Zifeng Xu

Journal: The Computer Journal, 2020, Volume 63, Number 4, Page 633

Read Online

Chapter

Intelligent Information and Database Systems

Yating Wang and Yuichi Goto

Series: Lecture Notes in Computer Science, Year: 2020, Volume 12034, Page 53

Read Online

Article

Lattice‐based nominative signature using pseudorandom function

Meenakshi Kansal, Ratna Dutta and Sourav Mukhopadhyay

Journal: IET Information Security, 2021, Volume 15, Number 4, Page 317

Read Online

Chapter

Algebra, Codes and Cryptology

George Te��eleanu

Series: Communications in Computer and Information Science, Year: 2019, Volume 1133, Page 149

Read Online

Conference Paper

New lower bound on the rate of traceability set systems

Elena Egorova and Ilya Vorobyev

Conference: 2019 XVI International Symposium "Problems of Redundancy in Information and Control Systems" (REDUNDANCY), Year: 2019, Page 93

Read Online

Chapter

Progress in Cryptology – INDOCRYPT 2020

Linru Zhang, Xiangning Wang, Yuechen Chen and Siu-Ming Yiu

Series: Lecture Notes in Computer Science, Year: 2020, Volume 12578, Page 666

Read Online

Article

A Novel Niederreiter-like cryptosystem based on the (u|u + υ)-construction codes

Roumaissa Mahdjoubi, Pierre Louis Cayrel, Sedat Akleylek and Guenda Kenza

Journal: RAIRO - Theoretical Informatics and Applications, 2021, Volume 55, Page 10

Read Online

Citations per year

2020

citing books

See More