Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
krüptograafia (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
74
Look more..
(1/1)
Export
export all inquiry results
(74)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
51
book article
Multiplierless design of high-speed very large constant multiplications
Aksoy, Levent
;
Roy, Debapriya Basu
;
Imran, Malik
;
Pagliarini, Samuel Nascimento
2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC 2024)
2024
/
p. 957-962
https://doi.org/10.1109/ASP-DAC58780.2024.10473954
book article
52
journal article EST
/
journal article ENG
Multiplierless design of very large constant multiplications in cryptography
Aksoy, Levent
;
Roy, Debapriya Basu
;
Imran, Malik
;
Karl, Patrick
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Circuits and Systems II : Express Briefs
2022
/
p. 4503-4507
https://doi.org/10.1109/TCSII.2022.3191662
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
53
book article
A novel anonymous authentication and key agreement scheme for smart grid
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 357-362
https://doi.org/10.5220/0009824203570362
book article
54
book article
Oracle separation in the non-uniform model
Buldas, Ahto
;
Laur, Sven
;
Niitsoo, Margus
Provable Security : Third International Conference : ProvSec 2009 : Guangzhou, China, November 11-13, 2009 : proceedings
2009
/
p. 230-244
https://link.springer.com/content/pdf/10.1007/978-3-642-04642-1_19.pdf
book article
55
book article
PASCAL : timing SCA resistant design and verification flow
Lai, Xinhui
;
Jenihhin, Maksim
;
Raik, Jaan
;
Paul, Kolin
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS 2019) : 1-3 July 2019, Greece
2019
/
p. 239-242 : ill
https://doi.org/10.1109/IOLTS.2019.8854458
book article
Seotud publikatsioonid
1
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
56
book article
Reflection, rewinding, and coin-toss in EasyCrypt
Firsov, Denis
;
Unruh, Dominique
CPP 2022 - Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2022
2022
/
p. 166-179
https://doi.org/10.1145/3497775.3503693
book article
57
book article
Security proofs for hash tree time-stamping using hash functions with small output size
Buldas, Ahto
;
Laanoja, Risto
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 235-250 : ill
book article
58
dissertation
Security protocols analysis in the computational model - dependency flow graphs-based approach = Turvaprotokollide analüüs arvutuslikul mudelil - sõltuvusgraafidel põhinev lähenemisviis
Tšahhirov, Ilja
2008
https://www.ester.ee/record=b2449152*est
dissertation
59
book article EST
/
book article ENG
Server-supported decryption for mobile devices
Kirss, Johanna Maria
;
Laud, Peeter
;
Snetkov, Nikita
;
Vakarjuk, Jelizaveta
Security and Trust Management : 18th International Workshop, STM 2022 Copenhagen, Denmark, September 29, 2022 : proceedings
2023
/
p. 71-81
https://doi.org/10.1007/978-3-031-29504-1_4
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
60
book article EST
/
book article ENG
Server-supported RSA signatures for mobile devices
Buldas, Ahto
;
Kalu, Aivo
;
Laud, Peeter
;
Oruaas, Mart
Computer Security - ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11–15, 2017 : proceedings, part I
2017
/
p. 315-333 : ill
https://doi.org/10.1007/978-3-319-66402-6_19
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
61
journal article
Song, Wei; Zheng, Yu; Fu, Chong; Shan, Pufang. A novel batch image encryption algorithm using parallel computing : [review]
Henno, Jaak
Zentralblatt MATH
2020
/
1 p
https://www.zbmath.org/?q=an:07333047
journal article
62
journal article EST
/
journal article ENG
SSProve : a foundational framework for modular cryptographic proofs in Coq
Haselwarter, Philipp G.
;
Rivas, Exequiel
;
Van Muylder, Antoine
;
Winterhalter, Théo
;
Abate, Carmine
;
Sidorenco, Nikolaj
;
Hriţcu, Cǎtǎlin
;
Maillard, Kenji
;
Spitters, Bas
ACM Transactions on Programming Languages and Systems
2023
/
art. 15
https://doi.org/10.1145/3594735
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
63
journal article
A systematic study of lattice-based NIST PQC algorithms : from reference implementations to hardware accelerators
Imran, Malik
;
Abideen, Zain Ul
;
Pagliarini, Samuel Nascimento
arXiv.org
2020
/
36 p. : ill
journal article
64
journal article
Zarebnia, M.; Parvaz, R. Image encryption algorithm by fractional based chaotic system and framelet transform
Henno, Jaak
zbMATH Open
2022
/
1 p.
https://zbmath.org/07577308
journal article
65
book article
Technological sovereignty : missing the point?
Maurer, Tim
;
Skierka-Canton, Isabel
;
Morgus, Robert
;
Hohmann, Mirko
2015 7th International Conference on Cyber Conflict : Architectures in Cyberspace : 26-29 May 2015, Tallinn, Estonia
2015
/
p. 53-67
book article
Seotud publikatsioonid
1
Securing digital government : towards governance mechanisms for e-state resilience = Digitaalse valitsuse turvalisus : valitsemismehhanismid e-riigi vastupidavuse tagamiseks
66
book article
The method of quantum optical communication based on entangled photon pairs
Udal, Andres
;
Jaanus, Martin
;
Umbleja, Kadri
;
Reeder, Reeno
BEC 2014 : 2014 14th Biennial Baltic Electronics Conference : proceedings of the 14th Biennial Baltic Electronics Conference : Tallinn University of Technology, October 6-8, 2014, Tallinn, Estonia
2014
/
p. 33-36 : ill
book article
67
journal article
Turvalisust tagav liit
Krustok, Jüri
Tehnikamaailm
2003
/
11, lk. 86-88
https://artiklid.elnet.ee/record=b1043973*est
journal article
68
journal article
Tänapäeva krüptoloogia : meetodid ja standardid
Praust, Valdo
Arvutimaailm
1994
/
6, lk. 46-48
journal article
69
book article EST
/
book article ENG
Unsatisfiability of comparison-based non-malleability for commitments
Firsov, Denis
;
Laur, Sven
;
Zhuchko, Ekaterina
Theoretical Aspects of Computing - ICTAC 2022 : 19th International Colloquium, Tbilisi, Georgia, September 27-30, 2022 : proceedings
2022
/
p. 188–194
https://doi.org/10.1007/978-3-031-17715-6_13
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
70
book article EST
/
book article ENG
Using games to understand and create randomness
Henno, Jaak
;
Jaakkola, Hannu
;
Mäkelainen, Jukka
Proceedings of the SQAMIA 2018: 7th Workshop of Software Quality, Analysis, Monitoring, Improvement, and Applications, Novi Sad, Serbia, 27-30. August 2018
2018
https://www.scopus.com/record/display.uri?eid=2-s2.0-85054376554&origin=inward&txGid=738e163a0c73e3a2a124039455cafce7
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
71
book article
Verified multiple-time signature scheme from one-time signatures and timestamping
Firsov, Denis
;
Lakk, Henri
;
Truu, Ahto
2021 IEEE 34th Computer Security Foundations Symposium (CSF) : June 21-25, 2021, Virtual Conference : proceedings
2021
/
13 p
https://doi.org/10.1109/CSF51468.2021.00051
book article
72
book article
Verified security of BLT signature scheme
Firsov, Denis
;
Buldas, Ahto
;
Truu, Ahto
;
Laanoja, Risto
CPP 2020 - Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2020, New Orleans 20 January 2020 through 21 January 2020
2020
/
p. 244-257
https://doi.org/10.1145/3372885.3373828
book article
73
journal article
Wireless PKI security and mobile voting
Tepandi, Jaak
;
Vassiljev, Stanislav
;
Tšahhirov, Ilja
Computer
2010
/
6, p. 54-60
https://www.computer.org/csdl/magazine/co/2010/06/mco2010060054/13rRUILLkGV
journal article
74
journal article
Äsjailmunud turbetehnoloogia raamatust : [Infosüsteemide turve, 2. osa, Turbetehnoloogia, Tallinn, 1998]
Praust, Valdo
Arvutimaailm
1999
/
2, lk. 38-39
journal article
Number of records 74, displaying
51 - 74
previous
1
2
3
next
subject term
1
1.
krüptograafia
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT