Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. [PDF]
Abdoun N +5 more
europepmc +1 more source
Public auditing for real-time medical sensor data in cloud-assisted HealthIIoT system. [PDF]
Ye W, Wang J, Tian H, Quan H.
europepmc +1 more source
Post-Quantum Secure Lightweight Revocable IBE with Decryption Key Exposure Resistance. [PDF]
Zhang D, Ju H, Yan Z, Feng S, Li F.
europepmc +1 more source
Post-quantum distributed ledger technology: a systematic survey. [PDF]
Parida NK +4 more
europepmc +1 more source
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions [PDF]
Gautham Sekar, S. Bhattacharya
openalex +1 more source
Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]
Dokku NS +5 more
europepmc +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source
A Secure and Lightweight Three-Factor-Based Authentication Scheme for Smart Healthcare Systems. [PDF]
Ryu J, Kang D, Lee H, Kim H, Won D.
europepmc +1 more source
Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism. [PDF]
Bhatia K, Pandey SK, Singh VK, Gupta DN.
europepmc +1 more source

