Quantum resilient security framework for privacy preserving AI in Apple MM1 on device architecture. [PDF]
Umer N +4 more
europepmc +1 more source
Post-quantum-inspired scalable blockchain architecture for internet hospital systems with lightweight privacy-preserving access control. [PDF]
Hao L +5 more
europepmc +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
Research on Development Progress and Test Evaluation of Post-Quantum Cryptography. [PDF]
Zhang M +6 more
europepmc +1 more source
Logarithmic-Size Post-Quantum Linkable Ring Signatures Based on Aggregation Operations. [PDF]
Zheng M +5 more
europepmc +1 more source
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
openaire
Related searches:
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhang, Lei +4 more
openaire +4 more sources
Certificateless Public Key Cryptography in the Standard Model
Fundamenta Informaticae, 2018Identity-based cryptography has been introduced by Shamir at Crypto’84 to avoid the use of expensive certificates in certified public key cryptography. In such system, the identity becomes the public key and each user needs to interact with a designated authority to obtain the related private key.
Canard, Sébastien, Trinh, Viet Cuong
openaire +1 more source
Design and Implementation of Certificateless Cryptography for IoT Applications
2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS), 2023This work introduces a cryptographic module for IoT devices that addresses the security vulnerabilities that come with their widespread adoption. Four core cryptographic mod- ules are implemented, including data confidentiality, message integrity, authentication, and secure communication channels.
Fares, Neam, Wang, Bo, Bakiras, Spiridon
openaire +1 more source

