We use Quarto to generate all outputs. @book{Nguyen2025TLBoAlg, author = {Duc-Tam Nguyen}, title = {The Little Book of algorithms}, year = {2025}, url = {https ...
Introduction Envision our digital world as a sprawling universe filled with glittering constellations of encrypted data, each packet of information ...
Abstract: Security protocols usually rely on public-key cryptographic algorithms, particularly, public-key signatures (digital signatures) to achieve integrity, authentication and non-repudiation. In ...
Abstract: Dijkstra’s shortest path algorithm is a fundamental graph search method widely used in domains such as navigation, robotics, gaming, and network routing. However, its performance can degrade ...
Imagine trying to design a key for a lock that is constantly changing its shape. That is the exact challenge we face in ...