Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes.
Tolegen Aidynov +3 more
doaj +1 more source
Portable PGAS‐Based GPU‐Accelerated Branch‐And‐Bound Algorithms at Scale
ABSTRACT The Branch‐and‐Bound (B&B) technique plays a key role in solving many combinatorial optimization problems, enabling efficient problem‐solving and decision‐making in a wide range of applications. It incrementally constructs a tree by building candidates to the solutions and abandoning a candidate as soon as it determines that it cannot lead to ...
Guillaume Helbecque +4 more
wiley +1 more source
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. [PDF]
Benjamin Dowling +3 more
openalex
Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography [PDF]
Armand Niederberger +2 more
openalex +1 more source
Authenticated Quantum Three Pass Protocol on One-Time Pad Cryptographic Technique
Gautam Kumar, Hemraj Saini, Vipin Balyan
openalex +2 more sources
Introduction to Protocol Building Blocks In Cryptography [PDF]
Maher Ali Rusho
openalex +1 more source
Secure Key Exchange in Tropical Cryptography: Leveraging Efficiency with Advanced Block Matrix Protocols [PDF]
Mariana Durcheva, Kiril Danilchenko
openalex +1 more source
Erratum: Entangled-state cryptographic protocol that remains secure even if nonlocal hidden variables exist and can be measured with arbitrary precision [Phys. Rev. A73, 034303 (2006)] [PDF]
Diederik Aerts +2 more
openalex +1 more source
Research on Security Protocol of RFID System Based on Public Key Cryptography
Song Wang, Bo Zhang
openalex +1 more source

