A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols
John C. Mitchell+3 more
openalex +1 more source
Card-Based Cryptographic Protocols Using a Minimal Number of Cards
Alexander Koch+2 more
semanticscholar +1 more source
HERMEES: A Holistic Evaluation and Ranking Model for Energy-Efficient Systems Applied to Selecting Optimal Lightweight Cryptographic and Topology Construction Protocols in Wireless Sensor Networks. [PDF]
Prvulovic P+3 more
europepmc +1 more source
A fully efficient secure quantum cryptography protocol
Xiang‐Bin Wang
openalex +2 more sources
Bio-inspired cryptography based on proteinoid assemblies. [PDF]
Mougkogiannis P, Ghadafi E, Adamatzky A.
europepmc +1 more source
A Practical Attack on a Braid Group Based Cryptographic Protocol [PDF]
Alexei Myasnikov+2 more
openalex +1 more source
Neural network-based symmetric encryption algorithm with encrypted traffic protocol identification. [PDF]
Hao J, Jin M, Li Y, Yang Y.
europepmc +1 more source
Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A72, 012322 (2005)] [PDF]
Xiang‐Bin Wang
openalex +1 more source