Visual cryptography using FPGA for authentication in online transactions
Efficiency and security of pre and post quantum cryptographic methods: theory and ...
Cryptography based on the composition of chaotic maps
Security architecture for wireless sensor networks
Quantum bit commitment protocols
Addressing human factors in the design of cryptographic solutions: a two-case stud...
Decoding Lattices for cryptography
The purpose of this proposal is to research anddevelop software on post-quantum cryptography and homomorphism, i.e., algorithms which are not vulnerable to quantum computer attacks. (AU)