Efficient post-quantum cryptography for building advanced security applications
Simulation of quantum communication protocols using faked states
Offloading of crypto functions to smartNICS in cloud-native environments
Addressing human factors in the design of cryptographic solutions: a two-case stud...
Transciphering: implementing Chacha20 with homomorphic encryption