default search action
Cryptography, Volume 2
Volume 2, Number 1, March 2018
- Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen, Yevgeni Koucheryavy:
Multi-Factor Authentication: A Survey. 1 - Dimitrios Alvanos, Konstantinos Limniotis, Stavros Stavrou:
On the Cryptographic Features of a VoIP Service. 3 - Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. 4 - Jani Suomalainen, Adrian Kotelba, Jari Kreku, Sami Lehtonen:
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT. 5 - Bertrand Cambou, Paul G. Flikkema, James Palmer, Donald Telesca, Christopher Robert Philabaum:
Can Ternary Computing Improve Information Assurance? 6
Volume 2, Number 2, June 2018
- Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser, John A. Chandy, Fatemeh Tehranipoor:
An Overview of DRAM-Based Security Primitives. 7 - Sebastian Baur, Holger Boche:
Robust Secure Authentication and Data Storage with Perfect Secrecy. 8 - Filipe Casal, João Rasga, André Souto:
Kolmogorov One-Way Functions Revisited. 9 - Alan T. Litchfield, Jeff Herbert:
ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation. 10 - Shoichi Hirose:
Sequential Hashing with Minimum Padding. 11
Volume 2, Number 3, September 2018
- Michel A. Kinsy, Lake Bu, Mihailo Isakov, Miguel Mark:
Designing Secure Heterogeneous Multicore Systems from Untrusted Components. 12 - Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser:
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †. 13 - Balaji Chandrasekaran, Ramadoss Balakrishnan:
An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments. 14 - Don Owen Jr., Derek Heeger, Calvin Chan, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic:
An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays. 15 - María Isabel González Vasco, Angela Robinson, Rainer Steinwandt:
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn. 16 - Sadman Sakib, Preeti Kumari, Bashir M. Sabquat Bahar Talukder, Md. Tauhidur Rahman, Biswajit Ray:
Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †. 17 - Juha Partala:
Provably Secure Covert Communication on Blockchain. 18 - Andreas Vogt:
Special Issue on Cryptographic Protocols. 19 - Taimour Wehbe, Vincent John Mooney III, David C. Keezer:
Hardware-Based Run-Time Code Integrity in Embedded Devices. 20 - Jim Plusquellic, Matthew Areno:
Correlation-Based Robust Authentication (Cobra) Using Helper Data Only. 21 - Yunxi Guo, Timothy Dee, Akhilesh Tyagi:
Barrel Shifter Physical Unclonable Function Based Encryption. 22 - Sadiel de la Fe, Carles Ferrer:
A Secure Algorithm for Inversion Modulo 2k. 23 - Joy Jo-Yi Chang, Bo-Yuan Huang, Justie Su-tzu Juan:
A New Visual Multi-Secrets Sharing Scheme by Random Grids. 24 - Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh Thiecoumba Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub:
On the Performance and Security of Multiplication in GF(2N). 25 - William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj:
Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers. 26
Volume 2, Number 4, December 2018
- Rami Sheikh, Rosario Cammarota:
Improving Performance and Mitigating Fault Attacks Using Value Prediction. 27 - Ying-Yu Chen, Bo-Yuan Huang, Justie Su-tzu Juan:
A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion. 28 - Salome James, N. B. Gayathri, Punugu Vasudeva Reddy:
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery. 29 - Edoardo Persichetti:
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment. 30 - Ted Krovetz:
The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF. 31 - Terry Shue Chien Lau, Chik How Tan:
A New Technique in Rank Metric Code-Based Encryption. 32 - Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption. 33 - Jialuo Han, Jidong Wang:
An Enhanced Key Management Scheme for LoRaWAN. 34 - Xavier Boyen, Thomas Haines:
Forward-Secure Linkable Ring Signatures from Bilinear Maps. 35 - Pratha Anuradha Kameswari, Lambadi Jyotsna:
An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques. 36 - Megha Agrawal, Donghoon Chang, Jinkeon Kang:
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices. 37 - James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman:
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity. 38 - Stefania Loredana Nita, Marius Iulian Mihailescu, Valentin Corneliu Pau:
Security and Cryptographic Challenges for Authentication Based on Biometrics Data. 39 - Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo:
Redundancy in Key Management for WSNs. 40 - Christian Frøystad, Inger Anne Tøndel, Martin Gilje Jaatun:
Security Incident Information Exchange for Cloud Service Provisioning Chains. 41 - Jonathan T. Trostle:
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion. 42
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.