Stop the war!
Остановите войну!
for scientists:
default search action
Cryptography, Volume 7
Volume 7, Number 1, March 2023
- Janaka Alawatugoda:
Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions. 1 - Iason Papadopoulos, Jiabo Wang:
Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber. 2 - Cryptography Editorial Office:
Acknowledgment to the Reviewers of Cryptography in 2022. 3 - Navya Mohan, J. P. Anita:
Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model. 4 - Michael Ampatzis, Theodore Andronikos:
Quantum Secret Aggregation Utilizing a Network of Agents. 5 - Jamunarani Damodharan, Emalda Roslin Susai Michael, Nasir Shaikh-Husin:
High Throughput PRESENT Cipher Hardware Architecture for the Medical IoT Applications. 6 - Mehwish Tahir, Yuansong Qiao, Nadia Kanwal, Brian Lee, Mamoona Naveed Asghar:
Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities. 7 - Reham Almukhlifi, Poorvi L. Vora:
Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds. 8 - Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden, William J. Buchanan:
Attacking Windows Hello for Business: Is It What We Were Promised? 9 - Takashi Kurokawa, Takuma Ito, Naoyuki Shinohara, Akihiro Yamamura, Shigenori Uchiyama:
Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC. 10 - Yihong Guo, Jinxin Zuo, Ziyu Guo, Jiahao Qi, Yueming Lu:
Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference. 11 - Osama Ahmed Khashan, Nour Mahmoud Khafajah, Waleed Alomoush, Mohammad Alshinwan, Sultan Alamri, Samer Atawneh, Mutasem K. Alsmadi:
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors. 12 - Atsuki Koyama, Van Chuong Tran, Manato Fujimoto, Vo Nguyen Quoc Bao, Thi Hong Tran:
A Decentralized COVID-19 Vaccine Tracking System Using Blockchain Technology. 13 - Yuri Bespalov, Lyudmila Kovalchuk, Hanna Nelasa, Roman Oliynykov, Rob Viglione:
Models for Generation of Proof Forest in zk-SNARK Based Sidechains. 14 - Casimer M. DeCusatis, Brian Gormanly, John Iacino, Reed Percelay, Alex Pingue, Justin Valdez:
Cybersecurity Test Bed for Smart Contracts. 15
Volume 7, Number 2, June 2023
- Buzhen He, Tao Feng:
Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment. 16 - Karthikeyan Nagarajan, Rupshali Roy, Rasit Onur Topaloglu, Sachhidh Kannan, Swaroop Ghosh:
SCANN: Side Channel Analysis of Spiking Neural Networks. 17 - Riccardo Della Sala, Giuseppe Scotti:
A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability. 18 - Pavol Zajac:
Algebraic Cryptanalysis with MRHS Equations. 19 - Mua'ad Abu-Faraj, Abeer Y. Al-Hyari, Charlie Obimbo, Khaled Aldebei, Ismail Al-Taharwa, Ziad A. Alqadi, Orabe Almanaseer:
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps. 20 - Quan Zhou, Yulong Zheng, Kaijun Wei, Minhui Chen, Zhikang Zeng:
A Multi-Party Functional Signatures Scheme for Private Blockchain. 21 - Michael Clear, Hitesh Tewari:
Anonymous Homomorphic IBE with Application to Anonymous Aggregation. 22 - Pallavi Kulkarni, Rajashri Khanai, Dattaprasad Torse, Nalini Iyer, Gururaj Bindagi:
Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment. 23 - Jayamine Alupotha, Xavier Boyen, Matthew McKague:
LACT+: Practical Post-Quantum Scalable Confidential Transactions. 24 - David A. August, Anne C. Smith:
PudgyTurtle Mode Resists Bit-Flipping Attacks. 25 - Luis Parrilla, Antonio García, Encarnación Castillo, Juan Antonio López Ramos, Uwe Meyer-Baese:
Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications. 26 - Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui S. Moreira, Christophe Pinto de Almeida Soares, Ivo Pereira:
Blockchain-Based Electronic Voting: A Secure and Transparent Solution. 27 - Je-Kuan Lin, Wun-Ting Lin, Ja-Ling Wu:
Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes. 28 - Eros Camacho-Ruiz, Macarena C. Martínez-Rodríguez, Santiago Sánchez-Solano, Piedad Brox:
Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems. 29 - Luigi Catuogno, Clemente Galdi:
Secure Firmware Update: Challenges and Solutions. 30 - Diana Maimut, George Teseleanu:
Inferring Bivariate Polynomials for Homomorphic Encryption Application. 31 - Tao Feng, Yufeng Liu:
Research on PoW Protocol Security under Optimized Long Delay Attack. 32
Volume 7, Number 3, July 2023
- Anton Leevik, Vadim Davydov, Sergey Bezzateev:
Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices. 33 - Anzhelika Mezina, Aleksandr Ometov:
Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification. 34 - Seonghwan Park, Hyunil Kim, Inkyu Moon:
Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks. 35 - Hamed Taherdoost:
The Role of Blockchain in Medical Data Sharing. 36 - Maher Boudabra, Abderrahmane Nitaj:
A New RSA Variant Based on Elliptic Curves. 37 - Aleksei D. Kodukhov, Valeria A. Pastushenko, Nikita S. Kirsanov, Dmitry A. Kronberg, Markus Pflitsch, Valerii M. Vinokur:
Boosting Quantum Key Distribution via the End-to-End Loss Control. 38 - Abderrahmane Nitaj, Tajjeeddine Rachidi:
Applications of Neural Network-Based AI in Cryptography. 39 - Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham, Trong-Thuc Hoang:
A Survey of Post-Quantum Cryptography: Start of a New Race. 40 - Aeryn Dunmore, Juliet Samandari, Julian Jang-Jaccard:
Matrix Encryption Walks for Lightweight Cryptography. 41 - Jeong Hwa Kang, Minhye Seo:
Enhanced Authentication for Decentralized IoT Access Control Architecture. 42 - Stan Korzilius, Berry Schoenmakers:
Divisions and Square Roots with Tight Error Analysis from Newton-Raphson Iteration in Secure Fixed-Point Arithmetic. 43 - Raghunandan Ramesh, Radhakrishna Dodmane, Surendra Shetty, Ganesh Aithal, Monalisa Sahu, Aditya Kumar Sahu:
A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem. 44 - Marco Cesati:
A New Idea for RSA Backdoors. 45
Volume 7, Number 4, September 2023
- Trong-Hung Nguyen, Cong-Kha Pham, Trong-Thuc Hoang:
A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography. 46 - Hwai-Tsu Hu, Tung-Tsun Lee:
Hiding Full-Color Images into Audio with Visual Enhancement via Residual Networks. 47 - Ivar Walskaar, Minh Christian Tran, Ferhat Özgür Çatak:
A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework. 48 - Tudor A. A. Soroceanu, Nicolas Buchmann, Marian Margraf:
On Multiple Encryption for Public-Key Cryptography. 49 - Luis Adrián Lizama-Pérez:
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era. 50 - Cheng-Chi Lee, Mehdi Gheisari, Mohammad Javad Shayegan, Milad Taleby Ahvanooey, Yang Liu:
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things. 51 - Devharsh Trivedi, Aymen Boudguiga, Nesrine Kaaniche, Nikos Triandopoulos:
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation. 52 - Eufemia Lella, Giovanni Schmid:
On the Security of Quantum Key Distribution Networks. 53 - Anastasios N. Bikos, Panagiotis E. Nastou, Georgios Petroudis, Yannis C. Stamatiou:
Random Number Generators: Principles and Applications. 54 - Kusum Lata, Linga Reddy Cenkeramaddi:
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis. 55 - Berry Schoenmakers, Toon Segers:
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation. 56 - Yamin Li:
Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms. 57 - Geraldine Shirley Nicholas, Dhruvakumar Vikas Aklekar, Bhavin Thakar, Fareena Saqib:
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V. 58 - Xian Guo, Ye Li, Yongbo Jiang, Jing Wang, Junli Fang:
Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments. 59 - Alessandra Dolmeta, Maurizio Martina, Guido Masera:
Comparative Study of Keccak SHA-3 Implementations. 60 - Mingfei Yu, Dewmini Sudara Marakkalage, Giovanni De Micheli:
Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation. 61 - Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu, Yong Yu:
A Publicly Verifiable E-Voting System Based on Biometrics. 62 - Li Duan, Yong Li, Lijun Liao:
Practical Certificate-Less Infrastructure with Application in TLS. 63 - Theodore Andronikos, Alla Sirokofskich:
One-to-Many Simultaneous Secure Quantum Information Transmission. 64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.