-
1
المؤلفون: Ehud Aharoni, Nir Drucker, Gilad Ezov, Hayim Shaul, Omri Soceanu
المصدر: IEEE Security & Privacy. 20:35-43
مصطلحات موضوعية: Computer Networks and Communications, Electrical and Electronic Engineering, Law
-
2
المؤلفون: Shay Gueron, Dusan Kostic, Edoardo Persichetti, Nir Drucker
المصدر: International Journal of Computer Mathematics: Computer Systems Theory. 6:364-374
مصطلحات موضوعية: Computational Mathematics, Post-quantum cryptography, Transformation (function), Computational Theory and Mathematics, Standardization, Computer science, Programming language, Code (cryptography), Specification document, NIST, computer.software_genre, computer
-
3
المؤلفون: Nir Drucker, Tomer Pelleg
المصدر: Cyber Security, Cryptology, and Machine Learning ISBN: 9783031076886
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::bfc03b5a417d27f3643a6d2f38de87b9
https://doi.org/10.1007/978-3-031-07689-3_8 -
4
المؤلفون: Moran Baruch, Nir Drucker, Lev Greenberg, Guy Moshkowich
المصدر: Lecture Notes in Computer Science ISBN: 9783031168147
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::106da811aa4dcfba5528471f89005d09
https://doi.org/10.1007/978-3-031-16815-4_29 -
5
المؤلفون: Nir Drucker, Shay Gueron
المصدر: Journal of Cryptology. 34
مصطلحات موضوعية: Authentication, Computer science, Applied Mathematics, 0102 computer and information sciences, Mutual authentication, Root cause, Computer security, computer.software_genre, 01 natural sciences, Computer Science Applications, 03 medical and health sciences, 0302 clinical medicine, 010201 computation theory & mathematics, 030220 oncology & carcinogenesis, Key (cryptography), Session key, Reflection attack, Hardware_REGISTER-TRANSFER-LEVELIMPLEMENTATION, computer, Protocol (object-oriented programming), Software, Vulnerability (computing)
-
6
المؤلفون: Shay Gueron, Nir Drucker
المصدر: IEEE Letters of the Computer Society. 2:12-15
مصطلحات موضوعية: Public-key cryptography, Elliptic curve, Speedup, business.industry, Computer science, Server, Elliptic Curve Digital Signature Algorithm, NIST, x86, Parallel computing, Side channel attack, business
-
7
المؤلفون: Nir Drucker, Shay Gueron
المصدر: Journal of Cryptographic Engineering. 9:341-357
مصطلحات موضوعية: Theoretical computer science, Cryptographic primitive, Computer Networks and Communications, Computer science, business.industry, Cryptography, 0102 computer and information sciences, 02 engineering and technology, Encryption, 01 natural sciences, 020202 computer hardware & architecture, 010201 computation theory & mathematics, McEliece cryptosystem, 0202 electrical engineering, electronic engineering, information engineering, Cryptosystem, Key encapsulation, Reference implementation, business, Software, Key exchange
-
8
المؤلفون: Nir Drucker, Shay Gueron, Dusan Kostic
المصدر: Lecture Notes in Computer Science ISBN: 9783030780852
CSCMLمصطلحات موضوعية: Public-key cryptography, Post-quantum cryptography, Property (philosophy), Transformation (function), Current (mathematics), Theoretical computer science, Computer science, business.industry, NIST, Cryptography, business, Randomness
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::8f91eae154ee2da648a733bd0315b237
https://doi.org/10.1007/978-3-030-78086-9_21 -
9
المؤلفون: Nir Drucker, Shay Gueron
المصدر: Advances in Intelligent Systems and Computing ISBN: 9783030704155
مصطلحات موضوعية: Digital Signature Algorithm, Key generation, Post-quantum cryptography, Speedup, Computer science, business.industry, Galois theory, NIST, Rainbow, Cryptography, Parallel computing, business
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::e2cb2c7c7060a0ea5ca6061c5c55440c
https://doi.org/10.1007/978-3-030-70416-2_17 -
10
المؤلفون: Shay Gueron, Nir Drucker, Dusan Kostic
المصدر: Post-Quantum Cryptography ISBN: 9783030442224
PQCryptoمصطلحات موضوعية: Computer science, 0202 electrical engineering, electronic engineering, information engineering, Code (cryptography), NIST, Window (computing), 020201 artificial intelligence & image processing, 02 engineering and technology, Algorithm, Decoding methods, 020202 computer hardware & architecture, Image (mathematics)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::a0873378e804f102b3c7f7840bb7cbd4
https://doi.org/10.1007/978-3-030-44223-1_3