Results 211 to 220 of about 1,901,421 (313)
Delegated multi-party private set intersections from extendable output functions. [PDF]
Bay A.
europepmc +1 more source
Enhancing security in instant messaging systems with a hybrid SM2, SM3, and SM4 encryption framework. [PDF]
Lu HJ, Juanatas RA, Abisado MB.
europepmc +1 more source
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification. [PDF]
Hao J, Jin M, Li Y, Yang Y.
europepmc +1 more source
Quantum cryptography integrating an optical quantum memory. [PDF]
Mamann H +8 more
europepmc +1 more source
Design of an integrated model using deep reinforcement learning and Variational Autoencoders for enhanced quantum security. [PDF]
Shingne H +3 more
europepmc +1 more source
Towards an information-theoretically safe cryptographic protocol
Pedro Fortuny Ayuso
openalex +2 more sources
Secure aggregation of sufficiently many private inputs. [PDF]
Veugen T, Spini G, Muller F.
europepmc +1 more source
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer
Santiago Escobar +2 more
openalex +1 more source

