Efficient post-quantum cryptography for building advanced security applications
Simulation of quantum communication protocols using faked states
Offloading of crypto functions to smartNICS in cloud-native environments
Addressing human factors in the design of cryptographic solutions: a two-case stud...
Efficient migration of high-performance computing science and engineering applicat...