Cybersecurity in the financial sector and the quantum-safe cryptography transition: in search of a precautionary approach in the EU Digital Operational Resilience Act framework. [PDF]
Jančiūtė L.
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography. [PDF]
Aquina N +9 more
europepmc +1 more source
Length-Weight Distribution of Non-Zero Elements in Randomized Bit Sequences. [PDF]
Lange C +3 more
europepmc +1 more source
A Post-Quantum Secure RFID Authentication Protocol Based on NTRU Encryption Algorithm. [PDF]
Liu H, Wu H, Ge N, Dong Q.
europepmc +1 more source
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. [PDF]
Zhang J +7 more
europepmc +1 more source
Genomic privacy and security in the era of artificial intelligence and quantum computing. [PDF]
Annan R +5 more
europepmc +1 more source
Preserving Privacy of Internet of Things Network with Certificateless Ring Signature. [PDF]
Zhang Y, Duan P, Li C, Zhang H, Ahmad H.
europepmc +1 more source
Secure and Efficient Lattice-Based Ring Signcryption Scheme for BCCL. [PDF]
Zhang Y, Duan P, Li C, Ahmad H, Zhang H.
europepmc +1 more source
Forensics System for Internet of Vehicles Based on Post-Quantum Blockchain. [PDF]
Zhang Z, Cao Z, Wang Y.
europepmc +1 more source

