796 results on '"Lange, Tanja"'
Search Results
2. Hash-Based Signatures
3. Vector Space
4. Pairing-Based Key Exchange
5. Isogeny-based Group Signatures and Accountable Ring Signatures in QROM
6. Sleep promotes T-cell migration towards CCL19 via growth hormone and prolactin signaling in humans
7. Concrete Analysis of Quantum Lattice Enumeration
8. Disorientation Faults in CSIDH
9. Autoimmune pre-disease
10. Disorientation Faults in CSIDH
11. The contribution of sleep to the neuroendocrine regulation of rhythms in human leukocyte traffic
12. Verifying Post-Quantum Signatures in 8 kB of RAM
13. Chronobiology
14. Sleep enhances numbers and function of monocytes and improves bacterial infection outcome in mice
15. Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies
16. Sleep Matters: CD4+ T Cell Memory Formation and the Central Nervous System
17. A narrative review of interventions for improving sleep and reducing circadian disruption in medical inpatients
18. Faster computation of the Tate pairing
19. Verifying Post-Quantum Signatures in 8 kB of RAM
20. Autoantibodies against the chemokine receptor 3 predict cardiovascular risk
21. Activated integrins identify functional antigen-specific CD8⁺ T cells within minutes after antigen stimulation
22. HILA5 Pindakaas: On the CCA Security of Lattice-Based Encryption with Error Correction
23. Rounded Gaussians : Fast and Secure Constant-Time Sampling for Lattice-Based Crypto
24. Lattice Klepto : Turning Post-Quantum Crypto Against Itself
25. NTRU Prime: Reducing Attack Surface at Low Cost
26. CSIDH: An Efficient Post-Quantum Commutative Group Action
27. On Using Expansions to the Base of -2
28. Sliding Right into Disaster: Left-to-Right Sliding Windows Leak
29. Short Generators Without Quantum Computers: The Case of Multiquadratics
30. Detecting and exploiting the circadian clock in rheumatoid arthritis
31. Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme
32. Dual EC: A Standardized Back Door
33. SPHINCS: Practical Stateless Hash-Based Signatures
34. How to Manipulate Curve Standards: A White Paper for the Black Hat http://bada55.cr.yp.to
35. Twisted Hessian Curves
36. Bad Directions in Cryptographic Hash Functions
37. Kangaroos in Side-Channel Attacks
38. TweetNaCl: A Crypto Library in 100 Tweets
39. Quantum Circuits for the CSIDH: Optimizing Quantum Evaluation of Isogenies
40. Disorientation Faults in CSIDH
41. A meta-analysis of the associations between insufficient sleep duration and antibody response to vaccination
42. Figures S1-S4 and Tables S1-S2 from Preclinical Development of U3-1784, a Novel FGFR4 Antibody Against Cancer, and Avoidance of Its On-target Toxicity
43. Data from Preclinical Development of U3-1784, a Novel FGFR4 Antibody Against Cancer, and Avoidance of Its On-target Toxicity
44. A meta-analysis of the associations between insufficient sleep duration and antibody response to vaccination
45. Potential effects of shift work on skin autoimmune diseases
46. System Consolidation During Sleep – A Common Principle Underlying Psychological and Immunological Memory Formation
47. Differential acute effects of sleep on spontaneous and stimulated production of tumor necrosis factor in men
48. Effects of an interleukin-1 receptor antagonist on human sleep, sleep-associated memory consolidation, and blood monocytes
49. Emotional memory can be persistently weakened by suppressing cortisol during retrieval
50. Post-quantum cryptography
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.