X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (3465) 3465
Conference Proceeding (1384) 1384
Dissertation (281) 281
Book Chapter (152) 152
Book / eBook (42) 42
Magazine Article (38) 38
Paper (4) 4
Government Document (2) 2
Publication (2) 2
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (1300) 1300
cryptosystem (829) 829
encryption (752) 752
security (749) 749
engineering, electrical & electronic (693) 693
computer science, information systems (653) 653
computer science, theory & methods (649) 649
cryptosystems (625) 625
algorithms (514) 514
elliptic curve cryptosystem (498) 498
computer science (486) 486
computer science, hardware & architecture (384) 384
public key cryptosystem (356) 356
authentication (346) 346
public-key cryptosystem (345) 345
mathematics, applied (328) 328
public key cryptography (326) 326
cryptanalysis (325) 325
data encryption (320) 320
elliptic curve cryptography (319) 319
telecommunications (272) 272
verschlüsselung (241) 241
analysis (234) 234
elliptic curve cryptosystems (228) 228
public key (217) 217
scheme (203) 203
privacy (202) 202
暗号 (201) 201
computer science, software engineering (193) 193
elliptic curves (193) 193
computer systems (186) 186
mathematics (186) 186
optics (186) 186
digital signature (182) 182
algorithm (180) 180
computer communication networks (179) 179
rsa cryptosystem (175) 175
information security (156) 156
rsa (155) 155
digital signatures (152) 152
情報 (143) 143
protocols (141) 141
polynomials (140) 140
hardware (136) 136
public key cryptosystems (136) 136
public-key cryptosystems (136) 136
computer information security (134) 134
image encryption (134) 134
scalar multiplication (131) 131
cloud computing (128) 128
information (128) 128
computer security (127) 127
chaos (125) 125
data security (122) 122
signatures (121) 121
computation (120) 120
mathematical analysis (118) 118
algorithm design and analysis (117) 117
research (111) 111
mathematical models (109) 109
ciphers (107) 107
access control (106) 106
biometrics (105) 105
coding and information theory (105) 105
methods (105) 105
engineering (103) 103
multiplication (103) 103
public key encryption (103) 103
secure (102) 102
elliptic curve (101) 101
public key infrastructure (99) 99
internet (98) 98
algorithm analysis and problem complexity (96) 96
entschlüsselung (96) 96
communications engineering, networks (94) 94
identity-based cryptosystem (94) 94
attack (91) 91
asymmetric cryptosystem (90) 90
system (90) 90
セキュリティ (90) 90
computer science, artificial intelligence (89) 89
data structures, cryptology and information theory (89) 89
management of computing and information systems (88) 88
paillier cryptosystem (87) 87
servers (87) 87
usage (86) 86
mceliece cryptosystem (85) 85
network security (83) 83
combinatorics (80) 80
efficient (80) 80
multivariate public key cryptosystem (80) 80
öffentlicher schlüssel (80) 80
chaos theory (79) 79
公開 鍵 暗号 (79) 79
kryptographie (78) 78
cryptography and security (77) 77
modular multiplication (77) 77
discrete logarithm (76) 76
homomorphic encryption (76) 76
post-quantum cryptography (75) 75
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (8) 8
Collection Dvlpm't (Acquisitions) - Vendor file (4) 4
Robarts - Stacks (4) 4
UofT at Mississauga - Stacks (3) 3
Mathematical Sciences - Stacks (2) 2
UofT at Scarborough - Stacks (2) 2
Gerstein Science - Stacks (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (4856) 4856
Japanese (358) 358
Chinese (191) 191
Korean (24) 24
Spanish (6) 6
German (4) 4
Czech (3) 3
French (3) 3
Russian (3) 3
Croatian (2) 2
Polish (2) 2
Arabic (1) 1
Belarusian (1) 1
Lithuanian (1) 1
Portuguese (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Optics express, ISSN 1094-4087, 2011, Volume 19, Issue 11, pp. 10387 - 10409
A secure communication network with quantum key distribution in a metropolitan area is reported. Six different QKD systems are integrated into a mesh-type... 
CHANNEL | WAVELENGTH | CRYPTOSYSTEMS | INSTALLED TELECOM FIBER | SECURITY | DISTRIBUTION-SYSTEM | STATES ATTACK | TIME | OPTICS | EFFICIENCY | CRYPTOGRAPHY | Physics - Quantum Physics
Journal Article
Nature photonics, ISSN 1749-4893, 2010, Volume 4, Issue 10, pp. 686 - 689
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws... 
Quantum mechanics | Detectors | Illumination | Patching | Photons | Photodiodes | Quantum cryptography | Eavesdropping
Journal Article
International journal of communication systems, ISSN 1074-5351, 2019, Volume 32, Issue 4, pp. e3886 - n/a
Summary We propose a quantum ‐resistant key exchange protocol based on hard problems of lattices using MaTRU cryptosystem as an underlying scheme. A key... 
shortest vectors problem | closest vector problem | NTRU cryptosystem | lattice based cryptosystems | MaTRU cryptosystem | public key cryptosystems | DISCRETE LOGARITHMS | ALGORITHMS | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Exchanging | Storage area networks | Private networks | Trusted third parties | Lattices
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 01/2017, Volume 63, Issue 1, pp. 404 - 427
Journal Article
2005, CRC Press series on discrete mathematics and its applications, ISBN 9781584885184, xxxiv, 808
Book
Physical review. A, Atomic, molecular, and optical physics, ISSN 1094-1622, 2013, Volume 88, Issue 5
We perform a proof-of-principle demonstration of the measurement-device-independent quantum key distribution protocol using weak coherent states and... 
FIBER | STATES | CRYPTOSYSTEMS | PHYSICS, ATOMIC, MOLECULAR & CHEMICAL | SECURITY | SYSTEMS | ATTACK | INTERFERENCE | OPTICS | SINGLE-PHOTON DETECTORS | COMMUNICATION | CRYPTOGRAPHY | Physics - Quantum Physics
Journal Article
Journal of Theoretical and Applied Information Technology, ISSN 1992-8645, 10/2018, Volume 96, Issue 19, pp. 6474 - 6486
Journal Article
SIAM Journal on Computing, ISSN 0097-5397, 2014, Volume 43, Issue 2, pp. 831 - 871
Journal Article
IEEE Communications Letters, ISSN 1089-7798, 02/2018, Volume 22, Issue 2, pp. 264 - 267
This letter presents a cryptanalysis of the modified McEliece cryptosystem recently proposed by Moufek et al.. The system is based on the juxtaposition of... 
Post-quantum cryptography | QC-LDPC and QC-MDPC codes | Public key | McEliece cryptosystem | Parity check codes | Generators | Decoding | Encryption | Complexity theory | TELECOMMUNICATIONS | CRYPTOSYSTEMS
Journal Article
IEICE transactions on fundamentals of electronics, communications and computer sciences, ISSN 0916-8508, 05/2001, Volume 84, Issue 5, pp. 1234 - 1243
Elliptic curve cryptosystems are based on the elliptic curve discrete logarithm problem (ECDLP). If elliptic curve cryptosystems avoid FR-reduction and... 
Trace | Elliptic curve cryptosystems | FR-reduction | trace | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | FINITE-FIELDS | CRYPTOSYSTEMS | ALGORITHM | COMPUTER SCIENCE, INFORMATION SYSTEMS | GF(P) | elliptic curve cryptosystems | DISCRETE LOGARITHMS | CRYPTOGRAPHY | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
The Journal of systems and software, ISSN 0164-1212, 2011, Volume 84, Issue 8, pp. 1319 - 1326
Journal Article
NATURE PHOTONICS, ISSN 1749-4885, 10/2010, Volume 4, Issue 10, pp. 686 - 689
The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws... 
PHYSICS, APPLIED | CRYPTOSYSTEMS | KEY DISTRIBUTION | SECURITY | ATTACK | PROOF | OPTICS | Physics - Quantum Physics
Journal Article
Nature (London), ISSN 1476-4687, 2017, Volume 549, Issue 7671, pp. 188 - 194
Cryptography is essential for the security of online communication, cars and implanted medical devices. However, many commonly used cryptosystems will be... 
VECTORS | CRYPTOSYSTEMS | MULTIDISCIPLINARY SCIENCES | ALGORITHM | Cryptography | Quantum computing | Research | Computers | Medical devices | Security | Quantum computers | Authenticity | Embedded systems | Computer systems | Algorithms | Data encryption | Confidentiality | Quantum cryptography | Computer security | Digital signatures | Communication
Journal Article
Optics Communications, ISSN 0030-4018, 11/2015, Volume 354, pp. 344 - 352
In this paper, we propose a new optical information processing tool termed as gyrator wavelet transform to secure a fully phase image, based on amplitude- and... 
Gyrator wavelet transform | Image encryption | Image compression | Optical asymmetric cryptosystem | FUSION | FRACTIONAL FOURIER-TRANSFORMS | ALGORITHM | CRYPTOSYSTEM | COMPRESSION | OPTICS
Journal Article
EURASIP Journal on Information Security, ISSN 1687-4161, 12/2011, Volume 2011, Issue 1, pp. 1 - 25
Journal Article
by Xiong, Y and He, A and Quan, C
Optics Communications, ISSN 0030-4018, 12/2018, Volume 428, pp. 120 - 130
In this paper, the security of a nonlinear optical cryptosystem is evaluated. Compared with traditional cryptosystems based on phase-truncated Fourier... 
Nonlinear optical cryptosystem | Specific attack | PTFT | IMAGE ENCRYPTION ALGORITHM | GYRATOR DOMAINS | ASYMMETRIC CRYPTOSYSTEM | SECURITY ENHANCEMENT | RETRIEVAL ALGORITHM | CHOSEN-PLAINTEXT ATTACK | SCHEME | 2 RANDOM MASKS | FRESNEL DOMAIN | KEYS | OPTICS | Mechanical engineering | Analysis | Numerical analysis
Journal Article
International Journal of Bifurcation and Chaos, ISSN 0218-1274, 05/2010, Volume 20, Issue 5, pp. 1405 - 1413
We cryptanalyze Fridrich's chaotic image encryption algorithm. We show that the algebraic weaknesses of the algorithm make it vulnerable against... 
image encryption | cryptanalysis | Chaos cryptography | SCHEME | MATHEMATICS, INTERDISCIPLINARY APPLICATIONS | MAPS | CIPHERS | CRYPTOSYSTEMS | MULTIDISCIPLINARY SCIENCES | SYSTEMS | CRYPTOGRAPHY | Algorithms | Permutations | Algebra | Computer simulation |