Ethernet Passive Mutual Authentication Scheme on Quantum Networks. [PDF]
Tian J, Qin P, Zhao Z, Qin B.
europepmc +1 more source
Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation. [PDF]
Zhai Y, Wang T, Zhou Y, Zhu F, Yang B.
europepmc +1 more source
Quantum-resilient software security: A fuzzy AHP-based assessment framework in the era of quantum computing. [PDF]
Almotiri SH.
europepmc +1 more source
A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system. [PDF]
Erukala SB+6 more
europepmc +1 more source
Cryptanalysis of Dedicated Cryptographic Hash Functions
In this thesis we study the security of a number of dedicated cryptographic hash functions against cryptanalytic attacks. We begin with an introduction to what cryptographic hash functions are and what they are used for. This is followed by strict definitions of the security properties often required from cryptographic hash functions.
openaire +1 more source
ANCHOR-Grid: Authenticating Smart Grid Digital Twins Using Real-World Anchors. [PDF]
Hatami M+5 more
europepmc +1 more source
A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones. [PDF]
Algarni AD, Innab N, Algarni F.
europepmc +1 more source
DNA-Inspired Lightweight Cryptographic Algorithm for Secure and Efficient Image Encryption. [PDF]
Abdelaal MA+5 more
europepmc +1 more source