A symbolic decision procedure for cryptographic protocols with time stamps
Liana Bozga+2 more
openalex +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
A J B, P K, R K, R M.
europepmc +1 more source
Multi-partite quantum cryptographic protocols with noisy GHZ states
Kai Chen, Hoi‐Kwong Lo
openalex +2 more sources
Infinite State AMC-Model Checking for Cryptographic Protocols [PDF]
Detlef Kähler+2 more
openalex +1 more source
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM+6 more
europepmc +1 more source
Guest editor’s introduction: Special issue on Modelling and Verification of Cryptographic Protocols
Roberto M. Amadio
openalex +1 more source
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
John C. Mitchell+3 more
openalex +1 more source
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm [PDF]
Konstantinos Chalkias+2 more
openalex +1 more source
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications. [PDF]
Kamal A+3 more
europepmc +1 more source