Language
English
German
^M
Dutch
Spanish
Title:
Limitations on information-theoretically-secure quantum homomorphic encryption
Source:
Physical Review A: Atomic, Molecular, and Optical Physics [1050-2947] yr:2014
Basic
Full text
Full text available via
American Physical Society Journals
Year:
Volume:
Issue:
Start Page:
Document delivery
Request document via
Library/Bibliothek
Users interested in this article also expressed an interest in the following:
description
1.
Martins, P.
"A Survey on Fully Homomorphic Encryption."
ACM computing surveys
50.6: 1-33.
description
2.
Acar, A.
"A Survey on Homomorphic Encryption Schemes."
ACM computing surveys
51.4: 1-35.
description
3.
"A Homomorphic Encryption-Based Private Collaborative Distributed Energy Management System."
IEEE transactions on smart grid.
12.6: 5233-5243.
description
4.
"Protecting Private Data by Honey Encryption."
Security and communication networks.
2017: 1-9.
description
5.
"Practical homomorphic encryption: A survey."
Circuits and Systems (ISCAS), 2014 IEEE International Symposium on
2792-2795.
description
6.
Bernstein, Daniel J.
"Post-quantum cryptography."
Nature.
549.7671: 188-194.
description
7.
"Decentralized attribute-based encryption and data sharing scheme in cloud storage."
China Communications/#/China Communications [[ZHONGGUO TONGXIN]]
15.2: 138-152.
description
8.
Gisin, N.
"Quantum cryptography."
Reviews of modern physics
74.1 (2002): 145-195.
description
9.
"A comparative survey on data encryption Techniques: Big data perspective."
Materials Today: Proceedings
46: 11035-11039.
description
10.
"Cost Effective RADIUS Authentication for Wireless Clients."
Database systems journal.
I.2: 27-32.
description
11.
Natanael, D.
"Text Encryption in Android Chat Applications using Elliptical Curve Cryptography (ECC)."
Procedia computer science
135 (2018): 283-291.
description
12.
Fehr, S.
"Quantum Cryptography."
Foundations of Physics
40.5 (2010): 494-531.
description
13.
"Private routing and ride‐sharing using homomorphic encryption."
IET Cyber-Physical Systems theory & applications
5.4: 311-320.
description
14.
Juels, A.
"Honey Encryption: Security Beyond the Brute-Force Bound."
Springer Berlin Heidelberg :, 2014. 656-310.
description
15.
Azab, M.
"ChameleonSoft: Software Behavior Encryption for Moving Target Defense."
Mobile Networks and Applications
18.2 (2013): 271-292.
description
16.
Bernstein, Daniel J.
"Post-Quantum Cryptography."
Post-Quantum Cryptography.
Springer Berlin Heidelberg, 2009.
description
17.
Quisquater, JJ.
"Fast decipherment algorithm for RSA public-key cryptosystem."
Electronics letters
18.21 (1982): 905-907.
description
18.
Shor, Peter W.
"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer."
SIAM journal on computing
26.5 (1997): 1484-1509.
View More...
View Less...
Select All
Clear All
Save Citations
Select Format
RefWorks
Reference Manager
EndNote
ProCite
Submit citation export
Advanced
Author
Other articles by this author? -- in
GeoRef
Other articles by this author? -- in
Online Contents Geosciences
Other articles by this author? -- using
Web of Science
Web Search
Find related information in
a Web Search Engine
Excite
Google
HotBot
Ixquick
ZOO
Ask
Yahoo!
Bing
Naver
Search Terms:
Search for related information in
Google Scholar
Article Title
Author Name
Journal Title
Other Search
Search Terms:
A service provided by the
Library of the Wissenschaftspark Albert Einstein
, Potsdam, Germany.
© 2005 SFX by Ex Libris Inc.