
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
.- Public Key Cryptosystems.
.- Extended Policy-based Sanitizable Signatures.
.- Practical Generic Construction of Fully Collision Resistant Chameleon Hash and Instantiations.
.- Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud Storage.
.- Generalized Cryptanalysis of Cubic Pell RSA.
.- On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms.
.- Hierarchical Functional Encryption for Quadratic Transformation.
.- Solving Modular Linear Equations via Automated Coppersmith and its Applications.
.- How to Construct Public Timeline for RSA-formed Time-Lock Cryptography.
.- Security Protocols Analysis.
.- Permutation Argument via Bases Transformation.
.- Efficient and Verifiable Multi-Server Framework for Secure Information Classification and Storage.
.- Formal Analysis of WAPI Authentication and Key Agreement Protocol.
.- Symmetric Cryptanalysis.
.- Committing Security of AEAD Based on Stream Cipher.
.- Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction Method.
.- Cube Attacks against Trivium, Kreyvium and ACORN with Practical Complexity..
.- Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based Ciphers.
.- A Note on Neutral Bits for ARX Ciphers from the Perspective of BCT.
.- An Automatic Search Method For 4-bit S-box Towards Considering Cryptographic Properties and Hardware Area Simultaneously.
.- Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations: Improved attacks on TWINE and LBlock.
.- Cryptanalysis of BAKSHEESH Block Cipher.
.- Quantum and Post Quantum Cryptography.
.- Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery Attack.
.- Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and TWINE.
.- Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON.
.- Quantum Public-Key Encryption of Quantum States, and More.


Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.