![Sustainability | Free Full-Text | Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks Sustainability | Free Full-Text | Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks](https://pub.mdpi-res.com/sustainability/sustainability-14-15901/article_deploy/html/images/sustainability-14-15901-g001.png?1669723430)
Sustainability | Free Full-Text | Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks
![An image encryption scheme based on public key cryptosystem and quantum logistic map | Scientific Reports An image encryption scheme based on public key cryptosystem and quantum logistic map | Scientific Reports](https://media.springernature.com/full/springer-static/image/art%3A10.1038%2Fs41598-020-78127-2/MediaObjects/41598_2020_78127_Fig1_HTML.png)
An image encryption scheme based on public key cryptosystem and quantum logistic map | Scientific Reports
A NOVEL CRYPTOSYSTEM BASED ON ABSTRACT AUTOMATA AND LATIN CUBES∗ 1. Introduction Automata theory provides a natural basis for
![Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains | SpringerLink Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains | SpringerLink](https://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs10207-022-00588-5/MediaObjects/10207_2022_588_Fig2_HTML.png)
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains | SpringerLink
![Cryptography | Free Full-Text | ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks Cryptography | Free Full-Text | ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks](https://www.mdpi.com/cryptography/cryptography-05-00035/article_deploy/html/images/cryptography-05-00035-g001.png)
Cryptography | Free Full-Text | ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks
![Correspondence between cellular automata and cryptography according to... | Download Scientific Diagram Correspondence between cellular automata and cryptography according to... | Download Scientific Diagram](https://www.researchgate.net/publication/282310954/figure/tbl1/AS:736162255749122@1552526167512/Correspondence-between-cellular-automata-and-cryptography-according-to-S2CA-EX.png)
Correspondence between cellular automata and cryptography according to... | Download Scientific Diagram
![Electronics | Free Full-Text | A Secure Personal Health Record Sharing System with Key Aggregate Dynamic Searchable Encryption Electronics | Free Full-Text | A Secure Personal Health Record Sharing System with Key Aggregate Dynamic Searchable Encryption](https://www.mdpi.com/electronics/electronics-11-03199/article_deploy/html/images/electronics-11-03199-g001.png)
Electronics | Free Full-Text | A Secure Personal Health Record Sharing System with Key Aggregate Dynamic Searchable Encryption
![Cryptographic models of nanocommunicaton network using quantum dot cellular automata: A survey - Debnath - 2021 - IET Quantum Communication - Wiley Online Library Cryptographic models of nanocommunicaton network using quantum dot cellular automata: A survey - Debnath - 2021 - IET Quantum Communication - Wiley Online Library](https://ietresearch.onlinelibrary.wiley.com/cms/asset/98d58db5-25d2-45c1-a006-cdbc2e1aa118/qtc212013-fig-0001-m.jpg)