Applications of Term Rewriting to Cryptographic Protocol Analysis (overview of the invited talk)
Jonathan K. Millen
openalex +1 more source
Quantum cryptographic three party protocols
Joern Mueller-Quade, Hiroyuki Imai
openalex +2 more sources
Evaluating Transport Layer Security 1.3 Optimization Strategies for 5G Cross-Border Roaming: A Comprehensive Security and Performance Analysis. [PDF]
Lastre JK, Ko Y, Kwon H, You I.
europepmc +1 more source
ChebIoD: a Chebyshev polynomial-based lightweight authentication scheme for internet of drones environments. [PDF]
Al-Mekhlafi ZG +9 more
europepmc +1 more source
A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols
John C. Mitchell +3 more
openalex +1 more source
Collaborative penetration testing suite for emerging generative AI algorithms. [PDF]
Radanliev P.
europepmc +1 more source
A fully efficient secure quantum cryptography protocol
XiangâBin Wang
openalex +2 more sources
A comparative performance analysis of fully homomorphic and attribute-based encryption schemes. [PDF]
More KD, Pramod D.
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source

