Cryptography Comparison Hub
4 papers - avg viability 3.3
Top Papers
- Condition-Triggered Cryptographic Asset Control via Dormant Authorization Paths(7.0)
Implement a secure, conditional digital asset control system with dormant authorization paths for regulatory compliance and secure delegation.
- Layered Performance Analysis of TLS 1.3 Handshakes: Classical, Hybrid, and Pure Post-Quantum Key Exchange(2.0)
This study analyzes the performance impact of post-quantum cryptography on TLS 1.3 handshakes across various layers.
- Unclonable Encryption in the Haar Random Oracle Model(2.0)
This paper presents a theoretical framework for unclonable encryption in a specific cryptographic model.
- Primitive-Root Determinant Densities over Prime Fields and Implications for PRIM-LWE(2.0)
This paper resolves a theoretical aspect of the prim-lwe problem related to primitive-root determinants in cryptographic contexts.