Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Future-proofing security for UAVs with post-quantum cryptography: A review
MA Khan, S Javaid, SAH Mohsan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being
employed across a broad spectrum of applications, ranging from military operations to …
employed across a broad spectrum of applications, ranging from military operations to …
Key compression for isogeny-based cryptosystems
We present a method for key compression in quantumresistant isogeny-based
cryptosystems, which allows a reduction in and transmission costs of per-party public …
cryptosystems, which allows a reduction in and transmission costs of per-party public …
End-to-end secure group communication for the Internet of Things
The remarkable growth of the Internet of Things (IoT) has given rise to application areas
where it is crucial to secure the endpoints, to guarantee users privacy and even safety. In …
where it is crucial to secure the endpoints, to guarantee users privacy and even safety. In …
[PDF][PDF] A lightweight implementation of NTRUEncrypt for 8-bit AVR microcontrollers
Introduced in 1996, NTRUEncrypt is not only one of the earliest but also one of the most
scrutinized lattice-based cryptosystems and a serious contender in NIST's ongoing Post …
scrutinized lattice-based cryptosystems and a serious contender in NIST's ongoing Post …
Anti-quantum generalized signcryption scheme based on multivariate and coding
Z Wang, YL Han, WC Liu, L Chen - 2019 Chinese Control And …, 2019 - ieeexplore.ieee.org
The development of quantum technology is changing with each passing day. While bringing
convenience to us, the security problems it brings cannot be underestimated. By studying …
convenience to us, the security problems it brings cannot be underestimated. By studying …
Evaluating post-quantum signatures for IoT devices
J Carneiro, LB Oliveira - … Conference on Green, Pervasive, and Cloud …, 2019 - Springer
With the advent of quantum computing, traditional digital signatures schemes such as RSA,
DSA, and ECDSA will become insecure thanks to Shor's algorithm which will break them in …
DSA, and ECDSA will become insecure thanks to Shor's algorithm which will break them in …
[PDF][PDF] 基于 LRPC 码和多变量的签密方案
**益亮, 蓝锦佳, 杨晓元 - 密码学报, 2016 - jcr.cacrnet.org.cn
多变量密码和纠错编码密码作为后量子密码中的两个候选方案, 因其都具备较高的效率和抗量子
攻击的特性, 成为密码学研究的新热点. 然而, 在对多变量密码的研究当中 …
攻击的特性, 成为密码学研究的新热点. 然而, 在对多变量密码的研究当中 …
[PDF][PDF] Mathematics of Post-Quantum Cryptography
V Konyukhov - 2022 - konyukhov.eu
This senior thesis aims to provide an overview of the existing cryptography methods and
their flaws in light of quantum computing and explore the postquantum cryptography …
their flaws in light of quantum computing and explore the postquantum cryptography …
Improvement of the Matrix for Simple Matrix Encryption Scheme
W Liu, Y Zhang, XA Wang, Z Wang - International Conference on …, 2021 - Springer
Multivariable public key cryptography is a scheme that can meet the anti-quantum
characteristics. The Simple Matrix scheme is constructed using the operations between …
characteristics. The Simple Matrix scheme is constructed using the operations between …
多变量公钥密码进展.
**益亮 - Information Technology & Network Security/**nxi …, 2021 - search.ebscohost.com
The rapid development of quantum computing has posed a serious threat to the widely used
public key cryp" tosystem. The cryptology research against quantum computing has become …
public key cryp" tosystem. The cryptology research against quantum computing has become …