Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Transitioning organizations to post-quantum cryptography
Quantum computers are expected to break modern public key cryptography owing to Shor's
algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant …
algorithm. As a result, these cryptosystems need to be replaced by quantum-resistant …
Improving the performance of the picnic signature scheme
D Kales, G Zaverucha - IACR Transactions on Cryptographic …, 2020 - tches.iacr.org
Picnic is a digital signature algorithm designed to provide security against attacks by
quantum computers. The design uses only symmetric-key primitives, and is an efficient …
quantum computers. The design uses only symmetric-key primitives, and is an efficient …
Ab-pake: Achieving fine-grained access control and flexible authentication
M Song, D Wang - IEEE Transactions on Information Forensics …, 2024 - ieeexplore.ieee.org
Two-factor authentication provides a strong defense against account compromise. However,
traditional two-factor authentication schemes cannot provide users with much flexibility and …
traditional two-factor authentication schemes cannot provide users with much flexibility and …
Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key
J Jiang, D Wang, G Zhang, Z Chen - European Symposium on Research …, 2022 - Springer
Passwords are the most prevalent authentication mechanism, and proliferate on nearly
every new web service. As users are overloaded with the tasks of managing dozens even …
every new web service. As users are overloaded with the tasks of managing dozens even …
Efficient FPGA implementations of LowMC and Picnic
Post-quantum cryptography has received increased attention in recent years, in particular,
due to the standardization effort by NIST. One of the second-round candidates in the NIST …
due to the standardization effort by NIST. One of the second-round candidates in the NIST …
A new decryption failure attack against HQC
Abstract HQC is an IND-CCA2 KEM running for standardization in NIST's post-quantum
cryptography project and has advanced to the second round. It is a code-based scheme in …
cryptography project and has advanced to the second round. It is a code-based scheme in …
[КНИГА][B] Post-quantum key exchange mechanism for safety critical systems
The high degree of automation demanded in the automotive industry has turned vehicles
into powerful mobile computing platforms. Various types of data are collected, distributed …
into powerful mobile computing platforms. Various types of data are collected, distributed …
Quantifying risks in cryptographic selection processes
DJ Bernstein - Cryptology ePrint Archive, 2023 - eprint.iacr.org
There appears to be a widespread belief that some processes of selecting cryptosystems
are less risky than other processes. As a case study of quantifying the difference in risks, this …
are less risky than other processes. As a case study of quantifying the difference in risks, this …
Decomposition of Quaternion-Like Algebras into a Set of Commutative Subalgebras
MT Duong, AA Moldovyan, DN Moldovyan… - … Conference on Future …, 2024 - Springer
Algebraic digital signature algorithms with a hidden group, which are based on the
computational difficulty of finding a solution to a system of many quadratic equations with …
computational difficulty of finding a solution to a system of many quadratic equations with …
A novel classical and quantum cryptographic scheme for data encryption
The protection of data is essential in this digitized world and hence the need for
cryptographic techniques to aid in this process. Cryptography in general helps achieve three …
cryptographic techniques to aid in this process. Cryptography in general helps achieve three …