1
2
3
Assuntos:
“...Post-quantum cryptography...”
Attacking and defending post-quantum cryptography candidates
Tese
4
Assuntos:
“...[en] CRYPTOGRAPHY...”
[en] FORMALIZATION OF CRYPTOGRAPHY ALGORITHMS IN AN INTERACTIVE THEOREM PROVER
Tese
5
“... in cryptography for security and privacy. Given the Nth degree truncated polynomial ring (NTRU) and Learning with...”
Homomorphic cryptography applied in SIR and SIRV models
Tese
7
8
9
“... incorporates the AES advanced cryptography algorithm, to improve the hidden data security. Computational...”
Path relinking and AES cryptography in color image steganography
Dissertação
10
Assuntos:
“...Petrography...”
Caracterização petrológica, geoquímica e geocronológica (U/Pb e Ar/Ar) do maciço sararé Nova Lacerda-MT
Dissertação
11
Assuntos:
“...Basalt's petrography...”
CO2 mineralization process in basalt rocks: study case, Serra Geral Formation, Paraná sedimentary Basin, São Paulo state
Dissertação
12
Assuntos:
“...Cryptography...”
Protocolos criptográficos de identificação baseados em reticulados
Dissertação
13
Assuntos:
“...Petrography...”
Estudo petrográfico e químico de diques ultramáficos e máficos do arquipélago de Fernando de Noronha, PE
Dissertação
14
Assuntos:
“...aggregates. granite. petrography...”
Influência das características morfológicas de britas graníticas e gnaíssicas na resistência à compressão do concreto
Dissertação
15
“... in cryptography can point toward a promising, comprehensive, solution that preserves four crucial properties...”
Who is the cowboy in Washington?: beating google at their own game with neuroscience and cryptography
Dissertação
16
Assuntos:
“...Hash-based cryptography...”
Post-quantum cryptography: an efficient differential fault analysis attack and a new one-time signature scheme
Tese
17
“... Institute of Stan- dards and Technology (NIST) post-quantum cryptography standardization process. Such...”
Parallel algorithms for elliptic curve cryptography scalar multiplication using the binary and naf methods
Dissertação
18
19
Assuntos:
“...Cryptography...”
Métodos eficientes para criptografia baseada em reticulados.
Dissertação
20
Assuntos:
“...Public key cryptography...”
Fórmulas de isogenias para modelos alternativos de curvas elípticas
Dissertação