Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +1 more source
A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures [PDF]
Akshay Wali+2 more
openalex +1 more source
A Secure and Lightweight Group Mobility Authentication Scheme for 6LoWPAN Networks. [PDF]
Ashrif FF+3 more
europepmc +1 more source
Blockchain for video watermarking: An enhanced copyright protection approach for video forensics based on perceptual hash function. [PDF]
Darwish SM, Abu-Deif MM, Elkaffas SM.
europepmc +1 more source
Analysing All-Optical Random Bit Sequences Using Gap-Based Approaches. [PDF]
Lange C, Ahrens A, Singh J, Grote O.
europepmc +1 more source
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT. [PDF]
Park K, Kim M, Park Y.
europepmc +1 more source
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
Phillip Rogaway, John Steinberger
openalex +1 more source
A chaotic digital signature algorithm based on a dynamic substitution box. [PDF]
Flores-Carapia R+3 more
europepmc +1 more source
B-UMCS: Blockchain-enabled Unified Medical Consultancy Service. [PDF]
Almohana A, Almomani I, El-Shafai W.
europepmc +1 more source