An overview of cryptographic primitives for possible use in 5G and beyond [PDF]
Jing Yang, Thomas Johansson
openalex +1 more source
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM. [PDF]
Li Q, Han J, Yuan L, Li X, Wang X.
europepmc +1 more source
Resilience evaluation of memristor based PUF against machine learning attacks. [PDF]
Ibrahim HM+2 more
europepmc +1 more source
Flexible multi-client functional encryption for set intersection. [PDF]
Rafiee M.
europepmc +1 more source
Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives [PDF]
Olivier Pereira+2 more
openalex +1 more source
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT. [PDF]
Peng T+7 more
europepmc +1 more source
On the dynamic reconfigurable implementations of MISTY1 and KASUMI block ciphers. [PDF]
Jiexian H+4 more
europepmc +1 more source
Fingerprinting Implementations of Cryptographic Primitives and Protocols that Use Post-Quantum Algorithms [PDF]
Tapas K. Mallick+3 more
openalex +1 more source
Seamless Transition to Post-Quantum TLS 1.3: A Hybrid Approach Using Identity-Based Encryption. [PDF]
Astrizi TL, Custódio R.
europepmc +1 more source
Key derivation function: key-hash based computational extractor and stream based pseudorandom expander. [PDF]
Chuah CW, Harun NZ, Hamid IRA.
europepmc +1 more source