Requirements and Security Models for Post-quantum Cryptography Analysis
Gespeichert in:
| Datum: | 2017 |
|---|---|
| Hauptverfasser: | , |
| Format: | Artikel |
| Sprache: | Englisch |
| Veröffentlicht: |
2017
|
| Schriftenreihe: | Mathematical and computer modelling. Series: Technical sciences |
| Online Zugang: | http://jnas.nbuv.gov.ua/article/UJRN-0000813807 |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Назва журналу: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNAS| _version_ | 1859509813022556160 |
|---|---|
| author | O. V. Potii K. V. Isirova |
| author_facet | O. V. Potii K. V. Isirova |
| author_sort | O. V. Potii |
| collection | Open-Science |
| first_indexed | 2025-07-17T19:28:29Z |
| format | Article |
| id | open-sciencenbuvgovua-39989 |
| institution | Library portal of National Academy of Sciences of Ukraine | LibNAS |
| language | English |
| last_indexed | 2025-07-17T19:28:29Z |
| publishDate | 2017 |
| record_format | dspace |
| series | Mathematical and computer modelling. Series: Technical sciences |
| spelling | open-sciencenbuvgovua-399892024-02-29T11:48:35Z Requirements and Security Models for Post-quantum Cryptography Analysis O. V. Potii K. V. Isirova 2308-5916 2017 en Mathematical and computer modelling. Series: Technical sciences http://jnas.nbuv.gov.ua/article/UJRN-0000813807 Article |
| spellingShingle | Mathematical and computer modelling. Series: Technical sciences O. V. Potii K. V. Isirova Requirements and Security Models for Post-quantum Cryptography Analysis |
| title | Requirements and Security Models for Post-quantum Cryptography Analysis |
| title_full | Requirements and Security Models for Post-quantum Cryptography Analysis |
| title_fullStr | Requirements and Security Models for Post-quantum Cryptography Analysis |
| title_full_unstemmed | Requirements and Security Models for Post-quantum Cryptography Analysis |
| title_short | Requirements and Security Models for Post-quantum Cryptography Analysis |
| title_sort | requirements and security models for post-quantum cryptography analysis |
| url | http://jnas.nbuv.gov.ua/article/UJRN-0000813807 |
| work_keys_str_mv | AT ovpotii requirementsandsecuritymodelsforpostquantumcryptographyanalysis AT kvisirova requirementsandsecuritymodelsforpostquantumcryptographyanalysis |