Requirements and Security Models for Post-quantum Cryptography Analysis
Saved in:
| Date: | 2017 |
|---|---|
| Main Authors: | O. V. Potii, K. V. Isirova |
| Format: | Article |
| Language: | English |
| Published: |
2017
|
| Series: | Mathematical and computer modelling. Series: Technical sciences |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0000813807 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
-
Secure Models of Post-Quantum Cryptographic Primitives
by: M. V. Yesina
Published: (2019) -
Actual Issues Analysis Regarding Perspective Public-Key Cryptography
by: Yu. I. Horbenko, et al.
Published: (2019) -
Algebraic Combinatorics of application for problems coding and cryptography
by: O. S. Pustovit, et al.
Published: (2017) -
On algebraic graph theory and non-bijectivemultivariate maps in cryptography
by: Ustimenko, V.
Published: (2015) -
Multilevel Identification Friend or Foe of Objects and Analysis of the Applicability of Post-Quantum Cryptographic Algorithms for Information Security
by: Yu. Korolov, et al.
Published: (2020)