Efficient post-quantum cryptography for building advanced security applications
Simulation of quantum communication protocols using faked states
Addressing human factors in the design of cryptographic solutions: a two-case stud...
Offloading of crypto functions to smartNICS in cloud-native environments
Transciphering: block ciphers compatible with fully homomorphic encryption