121
Table of Contents:
“...Distinguishing and Recovering Generalized Linearized ReedSolomon Codes -- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation -- Key-Recovery Fault Injection Attack on the Classic McEliece KEM...”
Full text
Full text
122
123
124
El Hajji, Said
2023
Table of Contents:
“...Invited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography...”2023
Full text
125
126
Bashir, Imran
2023
Table of Contents:
“...Mastering blockchain : a technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs, fourth edition -- Contributors -- Table of Contents -- Preface -- 1. Blockchain 101 -- 2. Decentralization -- 3. Symmetric...”2023
Full text
127
Table of Contents:
“... Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round...”
Full text
Full text
128
129
130
131
132
133
134
135
136
Aziz, Ahmed
2023
Table of Contents:
“... as the money of the future -- A Data Security Technique Combining Asymmetric Cryptography and Compressive Sensing for IoT Enabled Wireless Sensor Networks -- Energy Efficient and Secure Scheme based Compressive Sensing method for Internet of Vehicles -- Impact...”2023
Full text
137
138
139
140
Table of Contents:
“...Chapter 1 -- Introduction to Homomorphic Encryption for Financial Cryptography -- Chapter 2 -- Survey on Homomorphic Encryption for Financial Cryptography Workout -- Chapter 3 Improved login interface algorithm for Financial Transactions using Visual...”
Full text
Full text