GiCSI |
Trust and security in the digital information |
GiCSI |
About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call |
GiCSI |
Securing Blockchain with Quantum Safe Cryptography: When and How? |
GiCSI |
About the FrodoKEM lattice-based algorithm |
GiCSI |
Analysis of the FO Transformation in the Lattice-Based Post-Quantum Algorithms |