Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
2
views
22
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,515
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Challenges and Opportunities in the Digital Era : 17th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2018, Kuwait City, Kuwait, October 30 – November 1, 2018, Proceedings
Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices
other
Author(s):
Noureddine Chikouche
,
Abderrahmen Ghadbane
Publication date
(Online):
October 12 2018
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Scientific Phone Apps and Mobile Devices
Most cited references
22
Record
: found
Abstract
: not found
Book Chapter
: not found
NTRU: A ring-based public key cryptosystem
Jeffrey Hoffstein
,
Jill Pipher
,
Joseph Silverman
(1998)
0
comments
Cited
150
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
How to Achieve a McEliece-Based Digital Signature Scheme
Nicolas T. Courtois
,
Matthieu Finiasz
,
Nicolas Sendrier
(2001)
0
comments
Cited
43
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
NTRUSign: Digital Signatures Using the NTRU Lattice
Jeffrey Hoffstein
,
Nick Howgrave-Graham
,
Jill Pipher
…
(2003)
0
comments
Cited
30
times
– based on
0
reviews
Bookmark
All references
Author and book information
Contributors
Noureddine Chikouche:
(View ORCID Profile)
Book Chapter
Publication date (Print):
2018
Publication date (Online):
October 12 2018
Pages
: 67-80
DOI:
10.1007/978-3-030-02131-3_9
SO-VID:
c307264b-e640-4be9-9368-abb406d2b7cb
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Mobile Application Adoption Predictors: Systematic Review of UTAUT2 Studies Using Weight Analysis
pp. 13
The Role of Social Networks in Online Marketing and Measurement of Their Effectiveness – The Case Study
pp. 21
Learning Time Analysis - Case Study in the IT Sector in the Czech Republic
pp. 30
Acceptance and Use of Mobile Devices and Apps by Elderly People
pp. 37
Evaluation of the Effectiveness of the Use of a Mobile Application on Students’ Study Achievements – A Pilot Study
pp. 45
Digital Payments Adoption Research: A Review of Factors Influencing Consumer’s Attitude, Intention and Usage
pp. 53
Motivations Affecting Attitude Towards Information: Development of a Conceptual Model
pp. 60
Motivations to Seek Electronic Word of Mouth Communications and Information Adoption: Development of a Conceptual Model
pp. 67
Performance Evaluation of Post-quantum Public-Key Cryptography in Smart Mobile Devices
pp. 81
Investigating Dual Effects of Social Networking Sites
pp. 102
Do Business Ecosystems Differ from Other Business Networks? The Case of an Emerging Business Ecosystem for Digital Real-Estate and Facility Services
pp. 117
Strategic Positioning in Big Data Utilization: Towards a Conceptual Framework
pp. 126
Dynamic Risk Management for Cooperative Autonomous Medical Cyber-Physical Systems
pp. 129
Understanding the Value of MOOCs from the Perspectives of Students: A Value-Focused Thinking Approach
pp. 141
Is Ecosystem Health a Useful Metaphor? Towards a Research Agenda for Ecosystem Health Research
pp. 150
Implementation of Information Security in the EU Information Systems
pp. 164
STPA Guided Systems Engineering
pp. 164
Bridging the Knowledge Divide in GCC Countries: The Role of Digital Technologies
pp. 181
Design of an Algebraic Concept Operator for Adaptive Feedback in Physics
pp. 191
Smart City and Green Development
pp. 205
The Role of Data Analytics in Startup Companies: Exploring Challenges and Barriers
pp. 217
What is a Minimum Viable (Video) Game?
pp. 232
How to Avoid Financial Crises
pp. 244
Modeling the Role of C2C Information Quality on Purchase Decision in Facebook
pp. 255
What Should I Wear Today? An IoT–Based Dress Assistant for the e–Society
pp. 264
Generic Business Process Model for SMEs in M-Commerce Based on Talabat’s Case Study
pp. 279
Electronic Financial Disclosure: Islamic Banking vs Conventional Banking in GCC
pp. 292
Business Modeling and Flexibility in Software-Intensive Product Development - A Systematic Literature Review
pp. 305
Conflicts of Interest, Information Quality and Management Decision
pp. 315
Artificial Intelligence and Reliability of Accounting Information
pp. 325
Blockchain for Businesses: A Systematic Literature Review
pp. 337
Transportation Management and Decision Support Systems within the Supply Chain Management Framework
pp. 353
Enhancing Sensor Capabilities of Open-Source Simulation Tools to Support Autonomous Vehicles Safety Validation
pp. 344
Identifying Social Media’s Capability for Recognizing Entrepreneurial Opportunity: An Exploratory Study
pp. 355
The Influence of Social Media on Entrepreneur Motivation and Marketing Strategies in a Developing Country
pp. 365
Auditors’ Usage of Computer-Assisted Audit Techniques (CAATs): Challenges and Opportunities
pp. 393
“Boxing Clever”: Practical Techniques for Gaining Insights into Training Data and Monitoring Distribution Shift
pp. 376
The Use of Internet and Mobile Banking in the Czech Republic
pp. 387
Solutions for Higher Competence in Financial Literacy of Pupils at Secondary School in the Czech Republic
pp. 397
A Fuzzy Multi-criteria Decision Making Approach for Analyzing the Risks and Benefits of Opening Data
pp. 413
Analysis of the Banking Sector in the Czech Republic
pp. 425
Factors Determining Optimal Social Media Network Portfolio for Accounting Firms: The Case of the Czech Republic
pp. 446
Design of a Knowledge-Base Strategy for Capability-Aware Treatment of Uncertainties of Automated Driving Systems
pp. 436
How Can Technology Support Education in War – WarAware Education Platform for Syria
pp. 449
Information Technology Governance and Electronic Financial Disclosure
pp. 459
Examining the Factors Affecting Behavioural Intention to Adopt Mobile Health in Jordan
pp. 468
The Determinants of RFID Use and Its Benefits in Hospitals: An Empirical Study Examining Beyond Adoption
pp. 481
Concerns on the Differences Between AI and System Safety Mindsets Impacting Autonomous Vehicles Safety
pp. 480
Assimilation of Business Intelligence Systems: The Mediating Role of Organizational Knowledge Culture
pp. 492
The Relationship Between Audit Committee Characteristics and the Level of Sustainability Report Disclosure
pp. 504
Relating Big Data and Data Quality in Financial Service Organizations
pp. 520
Representational Quality Challenges of Big Data: Insights from Comparative Case Studies
pp. 539
ERP Adoption and Use in Production Research: An Archival Analysis and Future Research Directions
pp. 557
Solving Location Based Inventory Routing Problem in E-Commerce Using Ant Colony Optimization
pp. 567
Machine Learning Approach to Analyze and Predict the Popularity of Tweets with Images
pp. 577
A Critical Review of Empirical Research Examining SMEs Adoption from Selected Journals
pp. 588
Advantages and Drawbacks of Social Network Sites Utilization in Travel and Tourism
pp. 596
Raising a Model for Fake News Detection Using Machine Learning in Python
pp. 605
Design of a System for Melanoma Detection Through the Processing of Clinical Images Using Artificial Neural Networks
Similar content
1,515
Variational quantum attacks threaten advanced encryption standard based symmetric cryptography
Authors:
Zeguo Wang
,
Shijie Wei
,
Gui-Lu Long
…
DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs
Authors:
Wai-Kong Lee
,
Hwajeong Seo
,
Seong Oun Hwang
…
A new cryptography algorithm to protect cloud-based healthcare services
Authors:
See all similar