Cryptographic Boolean functions: One output, many design criteria
S. Picek +4 more
semanticscholar +1 more source
A design of multiple color image encryption scheme based on finite algebraic structures. [PDF]
Qayyum T, Shah T, Khan I, Popa IL.
europepmc +1 more source
Categorical framework for quantum-resistant zero-trust AI security. [PDF]
Cherkaoui I, Clarke C, Horgan J, Dey I.
europepmc +1 more source
Post-Quantum Cryptography: Riemann Primitives and Chrysalis [PDF]
Ian Malloy
openalex +1 more source
A multi-layered cryptographic trust reinforcement model against AI-driven threat propagation and zero-day cloud vulnerabilities in healthcare data ecosystems. [PDF]
Rani M +5 more
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
A Study on Modern Cryptographic Primitives and Signature Schemes
Jyotirmoy Das +2 more
openalex +2 more sources
Universal one-way hash functions and their cryptographic applications
M. Naor, M. Yung
semanticscholar +1 more source
Semantic decentralized authentication for IoT-based e-learning using Hedera Hashgraph and Knowledge Graphs. [PDF]
Luo L, Zhang Y, Tang Q.
europepmc +1 more source
HADES: Automated Hardware Design Exploration for Cryptographic Primitives
Fabian Buschkowski +5 more
openalex +2 more sources

