In the seventies and eighties, great efforts were made to produce more rational structural design procedures and codes. As a result of these efforts, allowable stress design was replaced by limit ...
Abstract: Code-based cryptography is a promising post-quantum cryptographic solution against attacks enabled by classical and quantum computers. The Niederreiter cryptosystem is a well-known ...
Abstract: Masking is one of the most well-established methods to thwart side-channel attacks. Many masking schemes have been proposed in the literature, and code-based masking emerges and unifies ...
一些您可能无法访问的结果已被隐去。
显示无法访问的结果