Results 111 to 120 of about 1,355 (213)
Differential Trail Search in Cryptographic Primitives with Big-Circle Chi:
Alireza Mehrdad +3 more
openalex +2 more sources
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +1 more source
Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives
Yohan Boichut +2 more
openalex +1 more source
Remarks on the Cryptographic Primitive of Attribute-based Encryption [PDF]
Zhengjun Cao, Lihua Liu
openalex +1 more source
ANALYSIS OF SOME CRYPTOGRAPHIC PRIMITIVES ON COMPUTER CLUSTERS [PDF]
P.S. Burov +4 more
openalex +1 more source
Quantum cryptography integrating an optical quantum memory. [PDF]
Mamann H +8 more
europepmc +1 more source
Transformation of cryptographic primitives : provable security and proof presentation [PDF]
Jaime Gaspar
openalex
Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
Abdelrahaman Aly +4 more
openalex +2 more sources

