Methods and Tools for Analysis of Symmetric Cryptographic Primitives
Oleksandr Kazymyrov
openalex +1 more source
Towards NIST Standards for Threshold Schemes for Cryptographic Primitives
Luís T. A. N. Brandão +2 more
openalex +1 more source
Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones. [PDF]
Su Y +5 more
europepmc +1 more source
Lightweight and Efficient Authentication and Key Distribution Scheme for Cloud-Assisted IoT for Telemedicine. [PDF]
Lee HJ +6 more
europepmc +1 more source
Homomorphic Primitives in Secret-Key Cryptography for Privacy and Authenticity
Chihong Joo
openalex +1 more source
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT. [PDF]
Peng T +7 more
europepmc +1 more source
A meta-analysis on NIST post-quantum cryptographic primitive finalists [PDF]
Steven Benny +4 more
openalex +1 more source
An Iterative quantum chaotic security method design for big data deployments using a multi-model framework for key generation, threat modelling, and anomaly-resilient validation. [PDF]
Kotangale A, Kumar MS.
europepmc +1 more source
On Central Primitives for Quantum Cryptography with Classical Communication [PDF]
Kai-Min Chung, Eli Goldin, Matthew Gray
openalex +1 more source

