A Study on Modern Cryptographic Primitives and Signature Schemes
Jyotirmoy Das +2 more
openalex +2 more sources
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT. [PDF]
Yan H, Wang Z, Lin L, Sun J, Liu S.
europepmc +1 more source
HADES: Automated Hardware Design Exploration for Cryptographic Primitives
Fabian Buschkowski +5 more
openalex +2 more sources
Post-Quantum Cryptography: Riemann Primitives and Chrysalis [PDF]
Ian Malloy
openalex +1 more source
Cryptographic protection of RGB images using SPN over Eisenstein integer ring modulo Eisenstein prime. [PDF]
Sajjad M +4 more
europepmc +1 more source
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +1 more source
Semantic decentralized authentication for IoT-based e-learning using Hedera Hashgraph and Knowledge Graphs. [PDF]
Luo L, Zhang Y, Tang Q.
europepmc +1 more source
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source

