default search action
Cryptography, Volume 8
Volume 8, Number 1, March 2024
- Ravikumar Selvam, Akhilesh Tyagi:
Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks. 1 - Devanshi Upadhyaya, Maël Gay, Ilia Polian:
Locking-Enabled Security Analysis of Cryptographic Circuits. 2 - Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang:
Novel and Efficient Privacy-Preserving Continuous Authentication. 3 - Ahmad Kabil, Heba Aslan, Marianne Azer:
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. 4 - Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao, Zung Le:
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. 5 - Chang Chen, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, Jin Li:
Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols. 6 - Kyriaki Tsantikidou, Nicolas Sklavos:
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures. 7 - Sagarika Behera, Prathuri Jhansi Rani:
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data. 8 - Hakan Uzuner, Elif Bilge Kavun:
NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V. 9 - Francesc Sebé, Sergi Simón:
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval. 10 - Yan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu:
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography. 11
Volume 8, Number 2, June 2024
- Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng, Chase Q. Wu:
A Survey of Consortium Blockchain and Its Applications. 12 - Minyan Gao, Liton Kumar Biswas, Navid Asadi, Domenic Forte:
Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource. 13 - Maksymilian Gorski, Wojciech Wodo:
Analysis of Biometric-Based Cryptographic Key Exchange Protocols - BAKE and BRAKE. 14 - Maksim Iavich, Tamari Kuchukhidze:
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation. 15 - Idris Somoye, Jim Plusquellic, Tom J. Mannos, Brian Dziki:
An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor. 16 - Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy:
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography. 17 - Peng Zhang, Ao Duan, Hengrui Lu:
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks. 18 - Ádám Vécsi, Attila Pethö:
Auditable Anonymous Electronic Examination. 19 - Zahraa Abdullah Ali, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish:
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids. 20 - Gregory Fitzgibbon, Carlo Ottaviani:
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography. 21 - Gregor Haywood, Saleem N. Bhatti:
Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths. 22 - Lahraoui Younes, Saiida Lazaar, Amal Youssef, Abderrahmane Nitaj:
Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance. 23 - Abdullah Aljuffri, Ruoyu Huang, Laura Muntenaar, Georgi Gaydadjiev, Kezheng Ma, Said Hamdioui, Mottaqiallah Taouil:
The Security Evaluation of an Efficient Lightweight AES Accelerator. 24 - Chunlei Li:
A Survey on Complexity Measures for Pseudo-Random Sequences. 25 - Asma Sifaoui, Matthew S. Eastin:
"Whispers from the Wrist": Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities. 26
Volume 8, Number 3, September 2024
- Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, Isa Inuwa-Dutse, Saad Khan, Simon Parkinson:
The Emerging Challenges of Wearable Biometric Cryptosystems. 27 - Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Dzianis Kanonik, Kateryna Kuznetsova, Oleksandr Domin:
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation. 28 - Javier de la Cruz, Edgar Martínez-Moro, Steven Muñoz-Ruiz, Ricardo Villanueva-Polanco:
Public Key Protocols from Twisted-Skew Group Rings. 29 - Mario Alviano, Giada Gabriele:
Improve Parallel Resistance of Hashcash Tree. 30 - Dana Sairangazhykyzy Amirkhanova, Maksim Iavich, Orken Mamyrbayev:
Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles. 31 - Jenilee Jao, Ian Wilcox, Jim Plusquellic, Biliana S. Paskaleva, Pavel B. Bochev:
Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions. 32 - Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Kateryna Kuznetsova, Dzianis Kanonik, Oleksandr Domin:
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities. 33 - Zichu Liu, Jia Hou, Jianfei Wang, Chen Yang:
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator. 34 - George Teseleanu:
A Note on the Quasigroup of Lai-Massey Structures. 35 - Jaya Dofe, Wafi Danesh, Vaishnavi More, Aaditya Chaudhari:
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs. 36 - RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62. 37
- Anatoly Bessalov, Volodymyr Sokolov, Serhii Abramov:
Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves. 38 - Komala Rangappa, Arun Kumar Banavara Ramaswamy, Mahadeshwara Prasad, Shreyas Arun Kumar:
A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment. 39 - Riley Vaughn, Mike Borowczak:
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants. 40 - Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang:
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack. 41 - Xingan Dai, Xinquan Zhou, Dehua Zhou, Jinhan Zhong, Chao Hong:
A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts. 42 - Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan:
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs. 43
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.