Code Integrity and Confidentiality: An Active Data Approach for Active and Healthy Ageing. [PDF]
Litvinov E +5 more
europepmc +1 more source
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård [PDF]
Elena Andreeva +3 more
openalex +1 more source
Efficient Linkable Ring Signature Scheme over NTRU Lattice with Unconditional Anonymity. [PDF]
Ye Q, Wang M, Meng H, Xia F, Yan X.
europepmc +1 more source
A hybrid hash framework for post quantum secure zero knowledge identification. [PDF]
Bhadane S +3 more
europepmc +1 more source
Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network. [PDF]
Vandervelden T +3 more
europepmc +1 more source
Second Preimage Attack pada Skema Davies-Meyer Berbasis SIMECK32/64 Menggunakan Metode Kortelainen
Aji Bagas Putranto, Andriani Adi Lestari
openalex +2 more sources
Lattice-Based Certificateless Proxy Re-Signature for IoT: A Computation-and-Storage Optimized Post-Quantum Scheme. [PDF]
Wei Z, Lan G, Zhao H, Li Z, Ju Z.
europepmc +1 more source
AES Based White Box Cryptography in Digital Signature Verification. [PDF]
Shukla PK +4 more
europepmc +1 more source
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
Thomas Espitau +2 more
openalex +2 more sources
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source

