Linked e-resources
Details
Table of Contents
Elementary Attestation of Cryptographically Useful Composite Moduli
Off -the-Shelf Security Testing Platform for Contactless Systems
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption
New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming
Secure Card-based Cryptographic Protocols Using Private Operations Against Malicious Players
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
Approach to Cryptography from Di erential Geometry with Example
On using zk-SNARKs and zk-STARKs inblockchain-based identity management
Manager asks: Which vulnerability must be eliminated first?
An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM
Behaviour-based Biometrics for Continuous User Authentication to Industrial Collaborative Robots
Secure Speaker Recognition System Using Homomorphic Encryption Reliable RFID Offline Privacy
Virtualization and Automation for Cybersecurity Training and Experimentation
Long-Term Secure Deniable Group Key Establishment
Card-based Covert Lottery
Hardware-Accelerated Cryptography for Software-Defined Networks
with P4
Security Analysis Using Subjective Attack Trees.
Off -the-Shelf Security Testing Platform for Contactless Systems
A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption
New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming
Secure Card-based Cryptographic Protocols Using Private Operations Against Malicious Players
Decentralized Multi-authority Anonymous Credential System with Bundled Languages on Identifiers
A Scalable Simulation of the BB84 Protocol Involving Eavesdropping
Approach to Cryptography from Di erential Geometry with Example
On using zk-SNARKs and zk-STARKs inblockchain-based identity management
Manager asks: Which vulnerability must be eliminated first?
An IND-CCA2 attack against the 1st- and 2nd-round versions of NTS-KEM
Behaviour-based Biometrics for Continuous User Authentication to Industrial Collaborative Robots
Secure Speaker Recognition System Using Homomorphic Encryption Reliable RFID Offline Privacy
Virtualization and Automation for Cybersecurity Training and Experimentation
Long-Term Secure Deniable Group Key Establishment
Card-based Covert Lottery
Hardware-Accelerated Cryptography for Software-Defined Networks
with P4
Security Analysis Using Subjective Attack Trees.