Research Papers
Scientific papers, publications, and research documents from our laboratory.
A Human Centric Holographic Proofeni6ma rwp
A Human-Centric-Holographic Proofeni6ma-rwp-.pdf
Agentic ai systems
Agentic-ai-systems.pdf
Cognitive SovereigntyThe Next Generation Self Sovereign Identity
Cognitive SovereigntyThe Next Generation Self-Sovereign Identity.pdf
CognitiveMethods ENI6MA RosarioWangCypherProof
CognitiveMethods-ENI6MA-RosarioWangCypherProof.pdf
Cognitive–Cryptographic Primitive
Cognitive–Cryptographic Primitive.pdf
Computational Quantum Intractability for ENI6MA Membership Only Proofs Knowledge
Computational-Quantum-Intractability-for-ENI6MA-Membership-Only-Proofs-Knowledge.pdf
ENI6MA Complexity White Paper Proof,Entropy, and Matrix Offsets
ENI6MA Complexity White Paper- Proof,Entropy, and Matrix Offsets.pdf
ENI6MA Protocol Rosario–Wang Formalism
ENI6MA Protocol - Rosario–Wang Formalism.pdf
ENI6MA CHACHA AES
ENI6MA-CHACHA-AES.pdf
ENI6MA Why Naive Attack Intuition is Wrong
ENI6MA_Why_Naive_Attack_Intuition_is_Wrong.pdf
Emergent holographic proofs of knowledge
Emergent-holographic-proofs-of-knowledge.pdf
Eni6ma a peer to peer proof of knowledge ledger and bank
Eni6ma-a-peer-to-peer-proof-of-knowledge-ledger-and-bank.pdf
Epherium coin
Epherium coin.pdf
Epherium Eni6ma
Epherium--Eni6ma.pdf
NO correlation attack
NO-correlation-attack.pdf
Quantum Complexity and Physical Bounds Eni6ma Cypher
Quantum Complexity and Physical Bounds Eni6ma Cypher.pdf
Quantum attack intractability
Quantum-attack-intractability.pdf
SYSTEM
SYSTEM.pdf
To Go Passwordless or Not
To Go Passwordless or Not.pdf
Toward Perfect Secrecy by Design
Toward Perfect Secrecy by Design.pdf
holographic entanglement for keyless proof
holographic-entanglement-for-keyless-proof.pdf
Research Collaboration
Interested in collaborating on research or reviewing our work?
We welcome collaboration on theoretical foundations, empirical evaluation, and systems integration.
Contact the Lab