A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

A Survey on Addressing IoT Security Issues by Embedding Blockchain Technology Solutions: Review, Attacks, Current Trends, and Applications

NTY Huan, ZA Zukarnain - IEEE Access, 2024 - ieeexplore.ieee.org
By 2025, the Internet of Things (IoT) infrastructure is projected to encompass over 75 billion
devices, facilitated by the increasing proliferation of intelligent applications. The IoT …

A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application

R Flores-Carapia, VM Silva-García… - Applied Sciences, 2023 - mdpi.com
Images with sensitive content require encryption for storage and transmission. Symmetric
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …

Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations

E Fathalla, M Azab - IEEE Access, 2024 - ieeexplore.ieee.org
The emergence of quantum computing poses significant risks to the security of current
cryptographic systems, particularly those reliant on classical algorithms vulnerable to …

An efficient quantum oblivious transfer protocol

S Sarkar, V Srivastava, T Mohanty, SK Debnath… - Cluster …, 2024 - Springer
Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive.
OT involves a sender having several pieces of information and a receiver having a choice …

[HTML][HTML] Improving traceability and sustainability in the agri-food industry through blockchain technology: A bibliometric approach, benefits and challenges

OO Apeh, NI Nwulu - Energy Nexus, 2025 - Elsevier
The globalization of the agri-food industry in recent years has increased the difficulty and
complexity of improving productivity and addressing challenges in food security. Thus …

Parallel Implementation of SPHINCS With GPUs

DC Kim, HJ Choi, SC Seo - … on Circuits and Systems I: Regular …, 2024 - ieeexplore.ieee.org
SPHINCS+ was selected as one of NIST Post-Quantum Cryptography Digital Signature
Algorithms (PQC-DSA). However, SPHINCS+ processes are slower compared to other PQC …

Beyond Current Cryptography: Exploring New Frontiers

P Pappachan, M Rahaman… - Innovations in Modern …, 2024 - igi-global.com
Cryptography has evolved significantly, from simple ancient ciphers to sophisticated
algorithms to secure modern digital communications. The advent of quantum computing and …

A constant round quantum secure protocol for oblivious polynomial evaluation

T Mohanty, V Srivastava, S Mesnager… - Journal of Information …, 2023 - Elsevier
Oblivious polynomial evaluation (OPE) is a secure two-party cryptographic protocol that
enables a receiver to obliviously retrieve polynomial value on its private input for a private …

Designing quantum-secure attribute-based encryption

YS Rao, V Srivastava, T Mohanty, SK Debnath - Cluster Computing, 2024 - Springer
In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising
encryption technique to realize fine-grained access control over encrypted data. ABE has …