homepages/16/11359-1,
East China Normal University, Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China, Wenyan Liu, Home Page, https://ieeexplore.ieee.org/author/37088503115
homepages/16/2189-2,
Hebei University, College of Mathematics and Information Science, Baoding, China, Zhiming Zhang and Zhi-Ming Zhang, Home Page, https://orcid.org/0000-0002-1462-4944
homepages/307/3100,
Chongqing University of Posts and Telecommunications, Chongqing Key Laboratory of Computational Intelligence, China, Youmin Zhang, Home Page, https://ieeexplore.ieee.org/author/37086581290
homepages/230/8122-1,
University of Technology Sydney, Sydney, NSW, Australia, Artur Grigorev, Home Page, https://ieeexplore.ieee.org/author/37087230720
homepages/230/9607,
University of Florence, Department of Energy Engineering, Florence, Italy, Francesca Rossi, Home Page, https://www.researchgate.net/profile/Francesca-Rossi-8
homepages/230/9613,
Lawrence Berkeley National Laboratory, Computational Research Division, Berkeley, CA, USA, Carl Yang and Carl Yue Yang, Home Page, https://www.researchgate.net/profile/Carl-Yang-5
homepages/230/9007,
Universidade NOVA de Lisboa, Caparica, Portugal, Nuno Paulino and Nuno F. Paulino, Home Page, https://ieeexplore.ieee.org/author/37283556900
homepages/230/4336,
National University of Ireland Maynooth (NUIM), Department of Computer Science, Maynooth, Ireland, John McDonald and John Mc Donald and John B. McDonald, Home Page, https://ieeexplore.ieee.org/author/38183151500
homepages/230/9609,
University of Portsmouth, School of Energy and Electronic Engineering, Portsmouth, UK, Yongqiang Lu, Home Page, https://ieeexplore.ieee.org/author/37089035412
homepages/230/1150-1,
University of Brasilia, Department of Mechanical Engineering, Brazil, Sergio A. Pertuz and Sergio Andres Pertuz Mendez, Home Page, https://orcid.org/0000-0002-6311-3251
homepages/230/9973,
City University of New York, NY, USA, André de Carvalho and André Salles de Carvalho, Home Page, http://lattes.cnpq.br/8644214878865621
H. Davis, M. Green, N. Heninger, K. Ryan, and A. Suhl. Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 352-386. Springer, (2024)
C. Badertscher, M. Maitra, C. Matt, and H. Waldner. Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 105-132. Springer, (2024)
H. Cui, H. Liu, D. Yan, K. Yang, Y. Yu, and K. Zhang. Public Key Cryptography (1), volume 14601 of Lecture Notes in Computer Science, page 229-258. Springer, (2024)
M. Campanelli, D. Fiore, and H. Khoshakhlagh. Public Key Cryptography (2), volume 14602 of Lecture Notes in Computer Science, page 132-167. Springer, (2024)
F. Baldimtsi, I. Karantaidou, and S. Raghuraman. Public Key Cryptography (2), volume 14602 of Lecture Notes in Computer Science, page 99-131. Springer, (2024)
N. Bhimrajka, A. Choudhury, and S. Varadarajan. Public Key Cryptography (2), volume 14602 of Lecture Notes in Computer Science, page 171-204. Springer, (2024)
Y. Chen, M. Zhang, C. Zhang, M. Dong, and W. Liu. Public Key Cryptography (3), volume 14603 of Lecture Notes in Computer Science, page 387-416. Springer, (2024)
M. Santos, C. Costello, and S. Frengley. Public Key Cryptography (3), volume 14603 of Lecture Notes in Computer Science, page 157-189. Springer, (2024)
W. Xia, L. Wang, G. Wang, D. Gu, and B. Wang. Public Key Cryptography (3), volume 14603 of Lecture Notes in Computer Science, page 3-35. Springer, (2024)