Cryptographic Protocol Composition via the Authentication Tests
J. Guttman
semanticscholar +1 more source
Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol. [PDF]
Bete S +4 more
europepmc +1 more source
Privacy-oriented cryptographic primitives and protocols for electronic voting
Παναγιώτης Γροντάς
openalex +1 more source
A Formal Language for Cryptographic Protocol Requirements
P. Syverson, C. Meadows
semanticscholar +2 more sources
Collaborative penetration testing suite for emerging generative AI algorithms. [PDF]
Radanliev P.
europepmc +1 more source
A comparative performance analysis of fully homomorphic and attribute-based encryption schemes. [PDF]
More KD, Pramod D.
europepmc +1 more source
Quantum secured blockchain framework for enhancing post quantum data security. [PDF]
Reddy NR +5 more
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
A Secure and Lightweight ECC-Based Authentication Protocol for Wireless Medical Sensors Networks. [PDF]
Shang Y, Chen J, Wang S, Zhang Y, Ma K.
europepmc +1 more source

