Loading…
Dispelling myths on superposition attacks: formal security model and attack analyses
Music, Luka, Chevalier, Céline, Kashefi, Elham
Published in Designs, codes, and cryptography (01.04.2022)
Published in Designs, codes, and cryptography (01.04.2022)
Get full text
Journal Article
Loading…
Loading…
Teleportation of a Quantum State - Quantum Computers Beating the Fiction
Altowijri, Talal, Nagy, Naya
Published in 2024 21st Learning and Technology Conference (L&T) (15.01.2024)
Published in 2024 21st Learning and Technology Conference (L&T) (15.01.2024)
Get full text
Conference Proceeding
Loading…
DiLizium: A Two-Party Lattice-Based Signature Scheme
Vakarjuk, Jelizaveta, Snetkov, Nikita, Willemson, Jan
Published in Entropy (Basel, Switzerland) (30.07.2021)
Published in Entropy (Basel, Switzerland) (30.07.2021)
Get full text
Journal Article
Loading…
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
Seyhan, Kübra, Nguyen, Tu N., Akleylek, Sedat, Cengiz, Korhan
Published in Cluster computing (01.06.2022)
Published in Cluster computing (01.06.2022)
Get full text
Journal Article
Loading…
Privacy-Preserving Preselection for Protected Biometric Identification Using Public-Key Encryption With Keyword Search
Bauspies, Pia, Kolberg, Jascha, Drozdowski, Pawel, Rathgeb, Christian, Busch, Christoph
Published in IEEE transactions on industrial informatics (01.05.2023)
Published in IEEE transactions on industrial informatics (01.05.2023)
Get full text
Journal Article