Results 111 to 120 of about 2,808 (186)
The robust development in the technology of Drone-enabled Internet of Things (DIoT) infrastructure has revolutionized major fields of disaster management, real-time surveillance, agricultural activities, and smart city management.
Abdullah Ayub Khan +5 more
doaj +1 more source
A System-on-a-Chip Implementation of a Post-Quantum Cryptography Scheme for Smart Meter Data Communications. [PDF]
Costa VLRD, López J, Ribeiro MV.
europepmc +1 more source
KangarooTwelve: Fast Hashing Based on KECCAK-p
Contains fulltext : 195384.pdf (Publisher’s version ) (Open Access)
Bertoni, G. +5 more
openaire +1 more source
Efficient implementation of code-based identification/signatures schemes
International audienceIn this paper we present efficient implementations of several code-based identification schemes, namely the Stern scheme, the Véron scheme and the Cayrel-Véron-El Yousfi scheme.
Cayrel, Pierre-Louis +4 more
core +1 more source
Performances of Cryptographic Accumulators
International audienceCryptographic accumulators are space/time efficient data structures used to verify if a value belongs to a set. They have found many applications in networking and distributed systems since their in- troduction by Benaloh and de ...
Kumar, Amrit +2 more
core
An image cryptography method by highly error-prone DNA storage channel. [PDF]
Zan X +6 more
europepmc +1 more source
Entropy Sources Based on Silicon Chips: True Random Number Generator and Physical Unclonable Function. [PDF]
Cao Y +7 more
europepmc +1 more source
A High-Entropy True Random Number Generator with Keccak Conditioning for FPGA. [PDF]
Piscopo V +4 more
europepmc +1 more source

