Antibodies and cryptographic hash functions: quantifying the specificity paradox. [PDF]
Petrella RJ.
europepmc +1 more source
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool [PDF]
Yu Sasaki
openalex +1 more source
Distributed Identity Authentication with Lenstra-Lenstra-Lovász Algorithm-Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem. [PDF]
Yuan Q +6 more
europepmc +1 more source
Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak. [PDF]
Braeken A.
europepmc +1 more source
Simplified Meet-in-the-middle Preimage Attacks on AES-based Hashing [PDF]
Mathieu Degré +2 more
openalex +1 more source
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others [PDF]
Shuang Wu +5 more
openalex +1 more source
Procedures for Building a Secure Environment in IoT Networks Using the LoRa Interface. [PDF]
Łeska S, Furtak J.
europepmc +1 more source
Using Automatic Generation of Relaxation Constraints to Improve the Preimage Attack on 39-step MD4 [PDF]
Gribanova Irina, Semenov Alexander
openalex +1 more source
Blockchain based solution for secure information sharing in pharma supply chain management. [PDF]
Padma A, Ramaiah M.
europepmc +1 more source
Linkable Ring Signature for Privacy Protection in Blockchain-Enabled IIoT. [PDF]
Guo F +5 more
europepmc +1 more source

