Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
krüptograafia (subject term)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
92
Look more..
(1/1)
Export
export all inquiry results
(92)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
51
journal article
Lahendus tulevikuks - PKI : ülevaade
Sepp, Olev
A & A
2000
/
1, lk. 35-45
https://artiklid.elnet.ee/record=b1003332*est
journal article
52
book article
Lattice-based threshold signature implementation for constrained devices
Dobias, Patrik
;
Ricci, Sara
;
Dzurenda, Petr
;
Malina, Lukas
;
Snetkov, Nikita
Proceedings of the 20th International Conference on Security and Cryptography (SECRYPT 2023). Vol. 1
2023
/
p. 724-730
https://doi.org/10.5220/0012112700003555
book article
53
book article
LiD-CAT: A lightweight detector for cache ATtacks
Reinbrecht, Cezar
;
Hamdioui, Said
;
Taouil, Mottaqiallah
;
Niazmand, Behrad
;
Ghasempouri, Tara
;
Raik, Jaan
;
Sepulveda, Johanna
2020 IEEE European Test Symposium (ETS) : ETS 2020, May 25-29, 2020 Tallinn, Estonia : proceedings
2020
/
6 p. : ill
https://doi.org/10.1109/ETS48528.2020.9131603
book article
54
book article
A lightweight Mmssage authentication code for virtual work in future smart cities
Pindar, Zahraddeen A.
;
Fayomi, Joshua O.
;
Waziri, Nazir H.
;
Abdulhamid, Bala M.
;
Jamel, Sapiee
2020 IEEE European Technology and Engineering Management Summit (E-TEMS), 5-7 March 2020, Dortmund University of Applied Sciences and Art
2020
/
5 p
https://doi.org/10.1109/E-TEMS46250.2020.9111859
book article
55
journal article
Liu, Feng; Yan, Wei Qi. Visual cryptography for image processing and security. Theory, methods, and applications. Cham: Springer. xvi, 143 p. (2014) : [review]
Henno, Jaak
Zentralblatt MATH
2015
/
[1] p
journal article
56
book article EST
/
book article ENG
Long-term secure commitments via extractable-binding commitments
Buldas, Ahto
;
Geihs, Matthias
;
Buchmann, Johannes
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017 : Proceedings, Part I
2017
/
p. 65-81
https://doi.org/10.1007/978-3-319-60055-0_4
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
57
journal article
Martínez-Guerra, Rafael; Montesinos-García, Juan Javier; Flores-Flores, Juan Pablo. Encryption and decryption algorithms for plain text and images using fractional calculus : [review)
Henno, Jaak
Zentralblatt MATH
2024
/
1 p.
https://zbmath.org/1531.94002
journal article
58
book article
The method of quantum optical communication based on entangled photon pairs
Udal, Andres
;
Jaanus, Martin
;
Umbleja, Kadri
;
Reeder, Reeno
BEC 2014 : 2014 14th Biennial Baltic Electronics Conference : proceedings of the 14th Biennial Baltic Electronics Conference : Tallinn University of Technology, October 6-8, 2014, Tallinn, Estonia
2014
/
p. 33-36 : ill
book article
59
journal article
Mittelbach, Arno; Fischlin, Marc.The theory of hash functions and random oracles. An approach to modern cryptography.
Henno, Jaak
zbMATH Open
2022
/
1 p.
https://zbmath.org/1490.94001
journal article
60
book article
Multiplierless design of high-speed very large constant multiplications
Aksoy, Levent
;
Roy, Debapriya Basu
;
Imran, Malik
;
Pagliarini, Samuel Nascimento
2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC 2024)
2024
/
p. 957-962
https://doi.org/10.1109/ASP-DAC58780.2024.10473954
book article
61
journal article EST
/
journal article ENG
Multiplierless design of very large constant multiplications in cryptography
Aksoy, Levent
;
Roy, Debapriya Basu
;
Imran, Malik
;
Karl, Patrick
;
Pagliarini, Samuel Nascimento
IEEE Transactions on Circuits and Systems II : Express Briefs
2022
/
p. 4503-4507
https://doi.org/10.1109/TCSII.2022.3191662
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
62
book article
A novel anonymous authentication and key agreement scheme for smart grid
Hammami, Hamza
;
Obaidat, Mohammad S.
;
Ben Yahia, Sadok
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 2020
2020
/
p. 357-362
https://doi.org/10.5220/0009824203570362
book article
63
book article
Oracle separation in the non-uniform model
Buldas, Ahto
;
Laur, Sven
;
Niitsoo, Margus
Provable Security : Third International Conference : ProvSec 2009 : Guangzhou, China, November 11-13, 2009 : proceedings
2009
/
p. 230-244
https://link.springer.com/content/pdf/10.1007/978-3-642-04642-1_19.pdf
book article
64
book article
PASCAL : timing SCA resistant design and verification flow
Lai, Xinhui
;
Jenihhin, Maksim
;
Raik, Jaan
;
Paul, Kolin
2019 IEEE 25th International Symposium on On-Line Testing and Robust System Design (IOLTS 2019) : 1-3 July 2019, Greece
2019
/
p. 239-242 : ill
https://doi.org/10.1109/IOLTS.2019.8854458
book article
Related publications
1
Approaches to extra-functional verification of security and reliability aspects in hardware designs = Riistvaraprojektide turva- ja töökindlusaspektide ekstrafunktsionaalse verifitseerimise lähenemisviisid
65
journal article
Perera, Maharage Nisansala Sevwandi; Nakamura, Toru; Matsunaka, Takashi; Yokoyama, Hiroyuki; Sakurai, Kouichi Attribute based tracing for securing group signatures against centralized authorities : [review]
Henno, Jaak
Zentralblatt MATH
2024
/
1 p.
https://zbmath.org/1529.94039
journal article
66
book article
Post-quantum trails: an educational board game about post-quantum cryptography
Vakarjuk, Jelizaveta
;
Snetkov, Nikita
Proceedings of the 7th International Conference on Historical Cryptology (HistoCrypt 2024)
2024
/
p. 244-248 : ill
https://dspace.ut.ee/items/1e6331fb-6e1c-4374-a2c1-2ef2eab3190a
https://doi.org/10.58009/aere-perennius0115
book article
67
journal article
Prasad, Kalika; Mahato, Hrishikesh. Cryptography using generalized Fibonacci matrices with affine-Hill cipher : [review]
Henno, Jaak
Zentralblatt MATH
2023
/
1 p.
https://www.zbmath.org/1506.94060
journal article
68
book article EST
/
book article ENG
Privacy-preserving server-supported decryption
Laud, Peeter
;
Pankova, Alisa
;
Vakarjuk, Jelizaveta
2025 IEEE 38th Computer Security Foundations Symposium (CSF)
2025
/
p. 48-63
https://doi.org/10.1109/CSF64896.2025.00004
https://www.computer.org/csdl/proceedings-article/csf/2025/108100a004/26w6qxiaHO8
book article EST
/
book article ENG
69
journal article EST
/
journal article ENG
Proving vote correctness in the IVXV internet voting system
Kraavi, Taaniel
;
Willemson, Jan
Scientific Reports
2025
/
art. 31793
https://doi.org/10.1038/s41598-025-16764-1
journal article EST
/
journal article ENG
70
book article
Reflection, rewinding, and coin-toss in EasyCrypt
Firsov, Denis
;
Unruh, Dominique
CPP 2022 - Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs, co-located with POPL 2022
2022
/
p. 166-179
https://doi.org/10.1145/3497775.3503693
book article
71
journal article
Salastus avatud süsteemides
Praust, Valdo
Arvutimaailm
1997
/
8, lk. 47-48
journal article
72
book article EST
/
book article ENG
Security proofs for hash tree time-stamping using hash functions with small output size
Buldas, Ahto
;
Laanoja, Risto
Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 : proceedings
2013
/
p. 235-250 : ill
https://doi.org/10.1007/978-3-642-39059-3_16
Conference Proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
73
dissertation
Security protocols analysis in the computational model - dependency flow graphs-based approach = Turvaprotokollide analüüs arvutuslikul mudelil - sõltuvusgraafidel põhinev lähenemisviis
Tšahhirov, Ilja
2008
https://www.ester.ee/record=b2449152*est
dissertation
74
book article EST
/
book article ENG
Server-supported decryption for mobile devices
Kirss, Johanna Maria
;
Laud, Peeter
;
Snetkov, Nikita
;
Vakarjuk, Jelizaveta
Security and Trust Management : 18th International Workshop, STM 2022 Copenhagen, Denmark, September 29, 2022 : proceedings
2023
/
p. 71-81
https://doi.org/10.1007/978-3-031-29504-1_4
Conference proceedings at Scopus
Article at Scopus
book article EST
/
book article ENG
75
book article EST
/
book article ENG
Server-supported RSA signatures for mobile devices
Buldas, Ahto
;
Kalu, Aivo
;
Laud, Peeter
;
Oruaas, Mart
Computer Security - ESORICS 2017 : 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11–15, 2017 : proceedings, part I
2017
/
p. 315-333 : ill
https://doi.org/10.1007/978-3-319-66402-6_19
Conference proceedings at Scopus
Article at Scopus
Article at WOS
book article EST
/
book article ENG
Number of records 92, displaying
51 - 75
previous
1
2
3
4
next
subject term
1
1.
krüptograafia
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT