Encryption Algorithms, Public Key Infrastructure, Digital Signatures, Hash Functions
NTWR Prime - redundant security based on NTRU Prime and LWR problems
eprint.iacr.orgยท2d
VeriPHY: Physical Layer Signal Authentication for Wireless Communication in 5G Environments
arxiv.orgยท1d
CarAT: Carbon Atom Tracing across Industrial Chemical Value Chains via Chemistry Language Models
arxiv.orgยท12h
Adaptive Fault-Tolerant Antenna Array Synthesis via Bayesian Optimization and Reinforcement Learning
Decoding RFID: A comprehensive overview of security, attacks, and the latest innovations (WHY2025)
cdn.media.ccc.deยท3d
'Lightweight cryptography' standard to protect small devices finalized
techxplore.comยท1d
A Performance Comparison of the Homomorphic Encryption Schemes CKKS and TFHE
eprint.iacr.orgยท3d
Loading...Loading more...