Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving. [PDF]
Kang D, Lee H, Lee Y, Won D.
europepmc +1 more source
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM +6 more
europepmc +1 more source
Post quantum blockchain architecture for internet of things over NTRU lattice. [PDF]
Yuan B, Wu F, Zheng Z.
europepmc +1 more source
A novel framework for secure cryptocurrency transactions using quantum crypto guard. [PDF]
Alsayaydeh JAJ +4 more
europepmc +1 more source
DiLizium: A Two-Party Lattice-Based Signature Scheme. [PDF]
Vakarjuk J, Snetkov N, Willemson J.
europepmc +1 more source
A Preimage Attack on the MJH Hash Function
Jooyoung Lee, Jongsung Kim
openaire +2 more sources
Antibodies and cryptographic hash functions: quantifying the specificity paradox. [PDF]
Petrella RJ.
europepmc +1 more source
Distributed Identity Authentication with Lenstra-Lenstra-Lovász Algorithm-Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem. [PDF]
Yuan Q +6 more
europepmc +1 more source
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak. [PDF]
Braeken A.
europepmc +1 more source
Procedures for Building a Secure Environment in IoT Networks Using the LoRa Interface. [PDF]
Łeska S, Furtak J.
europepmc +1 more source

