Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols
The emergence of quantum computing poses a formidable security challenge to network
protocols traditionally safeguarded by classical cryptographic algorithms. This paper …
protocols traditionally safeguarded by classical cryptographic algorithms. This paper …
Recent progress on the elliptic curve discrete logarithm problem
Recent progress on the elliptic curve discrete logarithm problem | Designs, Codes and
Cryptography Skip to main content SpringerLink Account Menu Find a journal Publish with us …
Cryptography Skip to main content SpringerLink Account Menu Find a journal Publish with us …
SCALLOP: scaling the CSI-FiSh
We present SCALLOP: SCALable isogeny action based on Oriented supersingular curves
with Prime conductor, a new group action based on isogenies of supersingular curves …
with Prime conductor, a new group action based on isogenies of supersingular curves …
[SÁCH][B] Understanding Bitcoin: Cryptography, engineering and economics
P Franco - 2014 - books.google.com
Discover Bitcoin, the cryptocurrency that has the finance world buzzing Bitcoin is arguably
one of the biggest developments in finance since the advent of fiat currency. With …
one of the biggest developments in finance since the advent of fiat currency. With …
SeaSign: compact isogeny signatures from class group actions
We give a new signature scheme for isogenies that combines the class group actions of
CSIDH with the notion of Fiat-Shamir with aborts. Our techniques allow to have signatures of …
CSIDH with the notion of Fiat-Shamir with aborts. Our techniques allow to have signatures of …
[SÁCH][B] The arithmetic of elliptic curves
JH Silverman - 2009 - Springer
The theory of elliptic curves is distinguished by its long history and by the diversity of the
methods that have been used in its study. This book treats the arithmetic theory of elliptic …
methods that have been used in its study. This book treats the arithmetic theory of elliptic …
[SÁCH][B] Introduction to modern cryptography: principles and protocols
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …
[SÁCH][B] Guide to elliptic curve cryptography
D Hankerson, AJ Menezes, S Vanstone - 2004 - books.google.com
After two decades of research and development, elliptic curve cryptography now has
widespread exposure and acceptance. Industry, banking, and government standards are in …
widespread exposure and acceptance. Industry, banking, and government standards are in …
[SÁCH][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
[SÁCH][B] Mathematics of public key cryptography
SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …
applications, such as digital signatures. A strong background in the mathematics underlying …