Found: 18
Select item for more details and to access through your institution.
Two-party quantum private comparison based on eight-qubit entangled state.
- Published in:
- Modern Physics Letters A, 2022, v. 37, n. 5, p. 1, doi. 10.1142/S0217732322500262
- By:
- Publication type:
- Article
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8995704
- By:
- Publication type:
- Article
5-pass zero-knowledge identity authentication scheme based on matrix completion problem.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2021, v. 42, n. 11, p. 79, doi. 10.11959/j.issn.1000-436x.2021212
- By:
- Publication type:
- Article
A Method of Ultra-Large-Scale Matrix Inversion Using Block Recursion.
- Published in:
- Information (2078-2489), 2020, v. 11, n. 11, p. 523, doi. 10.3390/info11110523
- By:
- Publication type:
- Article
New Quantum Private Comparison Protocol Without a Third Party.
- Published in:
- International Journal of Theoretical Physics, 2020, v. 59, n. 6, p. 1866, doi. 10.1007/s10773-020-04454-9
- By:
- Publication type:
- Article
Two-party quantum private comparison protocol with maximally entangled seven-qubit state.
- Published in:
- Modern Physics Letters A, 2019, v. 34, n. 28, p. N.PAG, doi. 10.1142/S0217732319502298
- By:
- Publication type:
- Article
Cryptanalysis and Improvement of Ye et al's Quantum Private Comparison Protocol.
- Published in:
- International Journal of Theoretical Physics, 2019, v. 58, n. 6, p. 1854, doi. 10.1007/s10773-019-04080-0
- By:
- Publication type:
- Article
Cryptanalysis of Zhang et al's Quantum Private Comparison and the Improvement.
- Published in:
- International Journal of Theoretical Physics, 2019, v. 58, n. 6, p. 1892, doi. 10.1007/s10773-019-04084-w
- By:
- Publication type:
- Article
Quantum protocols for secure multi-party summation.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 6, p. N.PAG, doi. 10.1007/s11128-018-2141-1
- By:
- Publication type:
- Article
Cryptanalysis of He's quantum private comparison protocol and a new protocol.
- Published in:
- International Journal of Quantum Information, 2019, v. 17, n. 3, p. N.PAG, doi. 10.1142/S0219749919500266
- By:
- Publication type:
- Article
A quantum query algorithm for computing the degree of a perfect nonlinear Boolean function.
- Published in:
- Quantum Information Processing, 2019, v. 18, n. 3, p. 1, doi. 10.1007/s11128-019-2175-z
- By:
- Publication type:
- Article
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States.
- Published in:
- International Journal of Theoretical Physics, 2018, v. 57, n. 6, p. 1705, doi. 10.1007/s10773-018-3696-4
- By:
- Publication type:
- Article
Quantum Public Key Cryptosystem Based on Bell States.
- Published in:
- International Journal of Theoretical Physics, 2017, v. 56, n. 11, p. 3431, doi. 10.1007/s10773-017-3506-4
- By:
- Publication type:
- Article
A privacy-preserving distance-based incentive scheme in opportunistic VANETs.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2789, doi. 10.1002/sec.1211
- By:
- Publication type:
- Article
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 15, p. 2802, doi. 10.1002/sec.1193
- By:
- Publication type:
- Article
Polynomial-time quantum algorithms for finding the linear structures of Boolean function.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 4, p. 1215, doi. 10.1007/s11128-015-0940-1
- By:
- Publication type:
- Article
Quantum algorithm to find invariant linear structure of MD hash functions.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 3, p. 813, doi. 10.1007/s11128-014-0909-5
- By:
- Publication type:
- Article
Power analysis based reverse engineering on the secret round function of block ciphers.
- Published in:
- Concurrency & Computation: Practice & Experience, 2014, v. 26, n. 8, p. 1531, doi. 10.1002/cpe.3068
- By:
- Publication type:
- Article