-
1
An efficient secure predictive demand forecasting system using Ethereum virtual machine
Published 2024-12-01Subjects: Get full text
Article -
2
Efficient inner product arguments and their applications in range proofs
Published 2023-05-01Subjects: Get full text
Article -
3
Quantum‐resistant anonymous identity‐based encryption with trable identities
Published 2022-03-01Subjects: “…cryptographic protocols…”
Get full text
Article -
4
Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature
Published 2021-01-01Subjects: “…cryptographic protocols…”
Get full text
Article -
5
Solving blockchain trilemma using off‐chain storage protocol
Published 2023-07-01Subjects: Get full text
Article -
6
Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms
Published 2025-01-01Subjects: Get full text
Article -
7
Enhancing Security and Efficiency in IoT Assistive Technologies: A Novel Hybrid Systolic Array Multiplier for Cryptographic Algorithms
Published 2025-03-01Subjects: Get full text
Article -
8
SOFTWARE TOOL FOR LOGICAL VALIDATION OF CRYPTOGRAPHIC KEY GENERATION PROTOCOLS BASED ON BAN-LOGIC
Published 2012-03-01Subjects: Get full text
Article -
9
Monitoring approach for online security of cryptographic protocol
Published 2016-06-01Subjects: “…cryptographic protocol identification…”
Get full text
Article -
10
-
11
A Secure and Scalable Authentication and Communication Protocol for Smart Grids
Published 2025-03-01Subjects: Get full text
Article -
12
Constructing formal models of cryptographic protocols from Alice&Bob style specifications via LLM
Published 2025-04-01Subjects: “…Cryptographic protocol…”
Get full text
Article