Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
quantum attack (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(1/65)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article
Chia, N-H.; Chung, K-M.; Yamakawa, T. A black-box approach to post-quantum zero-knowledge in constant rounds : [review]
Henno, Jaak
zbMATH Open
2022
/
1 p
https://zbmath.org/1486.94089
journal article
Number of records 1, displaying
1 - 1
keyword
65
1.
quantum attack
2.
attack detection
3.
attack graphs
4.
attack model
5.
attack sophistication
6.
attack trees
7.
attack vectors
8.
attack visualisation
9.
botnet attack
10.
corrosive attack
11.
cyber-attack
12.
cyber-attack pathways
13.
Denial of Service (DoS) attack
14.
discovery of attack scenarios
15.
DoS attack
16.
false data injection attack
17.
fault-injection attack
18.
ghost injection attack
19.
highly targeted attack
20.
iming side-channel attack
21.
Low-and-Slow DoS attack
22.
manufacturing-time attack
23.
Membership inference attack
24.
oracle-less attack
25.
ransomware attack
26.
removal attack
27.
Return of the Coppersmith’s Attack (ROCA)
28.
return of the Coppersmith’s attack vulnerability
29.
SAT attack
30.
SAT-based attack
31.
side-channel attack
32.
Side-Channel Attack Detection
33.
timing attack
34.
ameliorated quantum class topper optimization (A-QCTO)
35.
external quantum efficiency
36.
parabolic quantum well
37.
parabolic quantum wells
38.
polynomial multiplication; post-quantum cryptography
39.
post-quantum
40.
post-quantum cryptography
41.
post-quantum one-way functions
42.
post-quantum security
43.
quantum algorithm
44.
quantum chemical calculations
45.
quantum communication
46.
quantum communication chanell
47.
quantum computing
48.
quantum cryptography
49.
quantum detectors
50.
quantum dots (QDs)
51.
quantum efficiency
52.
quantum groups
53.
quantum grover
54.
quantum internet
55.
quantum logic
56.
quantum matrix spaces
57.
quantum noise
58.
Quantum state verification
59.
quantum structures
60.
quantum tunneling
61.
quantum well
62.
quantum wells
63.
quantum-enhanced secure and energy-efficient routing (QSEER) protocol
64.
quantum-inspired algorithms
65.
quantum-inspired clustering scheme (QICS)
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT