


default search action
Cryptography, Volume 8
Volume 8, Number 1, March 2024
- Ravikumar Selvam
, Akhilesh Tyagi
:
Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks. 1 - Devanshi Upadhyaya, Maël Gay, Ilia Polian:
Locking-Enabled Security Analysis of Cryptographic Circuits. 2 - Ahmed Fraz Baig
, Sigurd Eskeland, Bian Yang:
Novel and Efficient Privacy-Preserving Continuous Authentication. 3 - Ahmad Kabil
, Heba Aslan, Marianne Azer
:
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. 4 - Yinhao Jiang
, Mir Ali Rezazadeh Baee
, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk
, Tanveer A. Zia
, Zhen Zhao
, Zung Le:
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. 5 - Chang Chen
, Guoyu Yang
, Zhihao Li
, Fuan Xiao, Qi Chen, Jin Li:
Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols. 6 - Kyriaki Tsantikidou, Nicolas Sklavos
:
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures. 7 - Sagarika Behera
, Prathuri Jhansi Rani
:
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data. 8 - Hakan Uzuner
, Elif Bilge Kavun
:
NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V. 9 - Francesc Sebé
, Sergi Simón
:
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval. 10 - Yan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu:
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography. 11
Volume 8, Number 2, June 2024
- Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng, Chase Q. Wu
:
A Survey of Consortium Blockchain and Its Applications. 12 - Minyan Gao, Liton Kumar Biswas, Navid Asadi, Domenic Forte
:
Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource. 13 - Maksymilian Gorski
, Wojciech Wodo
:
Analysis of Biometric-Based Cryptographic Key Exchange Protocols - BAKE and BRAKE. 14 - Maksim Iavich
, Tamari Kuchukhidze
:
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation. 15 - Idris Somoye
, Jim Plusquellic
, Tom J. Mannos
, Brian Dziki:
An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor. 16 - Oleksandr Kuznetsov
, Nikolay Poluyanenko
, Emanuele Frontoni
, Sergey Kandiy
:
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography. 17 - Peng Zhang
, Ao Duan
, Hengrui Lu
:
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks. 18 - Ádám Vécsi
, Attila Pethö
:
Auditable Anonymous Electronic Examination. 19 - Zahraa Abdullah Ali, Zaid Ameen Abduljabbar
, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi
, Iman Qays Abduljaleel
, Abdulla J. Y. Aldarwish
:
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids. 20 - Gregory Fitzgibbon, Carlo Ottaviani
:
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography. 21 - Gregor Haywood
, Saleem N. Bhatti
:
Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths. 22 - Lahraoui Younes
, Saiida Lazaar
, Amal Youssef
, Abderrahmane Nitaj
:
Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance. 23 - Abdullah Aljuffri
, Ruoyu Huang, Laura Muntenaar, Georgi Gaydadjiev
, Kezheng Ma, Said Hamdioui, Mottaqiallah Taouil:
The Security Evaluation of an Efficient Lightweight AES Accelerator. 24 - Chunlei Li
:
A Survey on Complexity Measures for Pseudo-Random Sequences. 25 - Asma Sifaoui, Matthew S. Eastin:
"Whispers from the Wrist": Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities. 26
Volume 8, Number 3, September 2024
- Khalid Al Ajlan, Tariq Alsboui
, Omar Alshaikh
, Isa Inuwa-Dutse
, Saad Khan
, Simon Parkinson
:
The Emerging Challenges of Wearable Biometric Cryptosystems. 27 - Oleksandr Kuznetsov
, Alex Rusnak
, Anton Yezhov
, Dzianis Kanonik
, Kateryna Kuznetsova, Oleksandr Domin
:
Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation. 28 - Javier de la Cruz
, Edgar Martínez-Moro
, Steven Muñoz-Ruiz, Ricardo Villanueva-Polanco
:
Public Key Protocols from Twisted-Skew Group Rings. 29 - Mario Alviano
, Giada Gabriele
:
Improve Parallel Resistance of Hashcash Tree. 30 - Dana Sairangazhykyzy Amirkhanova
, Maksim Iavich
, Orken Mamyrbayev
:
Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles. 31 - Jenilee Jao, Ian Wilcox, Jim Plusquellic
, Biliana S. Paskaleva, Pavel B. Bochev:
Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions. 32 - Oleksandr Kuznetsov
, Alex Rusnak
, Anton Yezhov
, Kateryna Kuznetsova, Dzianis Kanonik, Oleksandr Domin
:
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities. 33 - Zichu Liu, Jia Hou, Jianfei Wang, Chen Yang
:
A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator. 34 - George Teseleanu
:
A Note on the Quasigroup of Lai-Massey Structures. 35 - Jaya Dofe
, Wafi Danesh, Vaishnavi More, Aaditya Chaudhari:
Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs. 36 - RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62. 37
- Anatoly Bessalov, Volodymyr Sokolov
, Serhii Abramov:
Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves. 38 - Komala Rangappa
, Arun Kumar Banavara Ramaswamy
, Mahadeshwara Prasad
, Shreyas Arun Kumar
:
A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment. 39 - Riley Vaughn, Mike Borowczak
:
Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants. 40 - Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang:
Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack. 41 - Xingan Dai, Xinquan Zhou, Dehua Zhou
, Jinhan Zhong, Chao Hong:
A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts. 42 - Ahmad Kabil
, Heba Aslan, Marianne A. Azer
, Mohamed Rasslan:
CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs. 43
Volume 8, Number 4, 2024
- Mohammed Rahmani
, Abderrahmane Nitaj
, M'hammed Ziane:
Partial Exposure Attacks on a New RSA Variant. 44 - Mijail Borges-Quintana
, Miguel A. Borges-Trenard
, Osmani Tito-Corrioso
, Omar Rojas
, Guillermo Sosa Gómez
:
Combined and General Methodologies of Key Space Partition for the Cryptanalysis of Block Ciphers. 45 - Cyrus Minwalla
, Jim Plusquellic
, Eirini Eleni Tsiropoulou
:
Lightweight Mutually Authenticated Key Exchange with Physical Unclonable Functions. 46 - Saadia Aziz, Ijaz Ali Shoukat, Mohsin Iftikhar, Mohsin Murtaza
, Abdulmajeed M. Alenezi
, Cheng-Chi Lee
, Imran Taj:
Next-Generation Block Ciphers: Achieving Superior Memory Efficiency and Cryptographic Robustness for IoT Devices. 47 - Wen Gao
, Haoyuan Yao, Baodong Qin
, Xiaoli Dong, Zhen Zhao
, Jiayu Zeng:
Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions. 48 - Zeeshan Ashraf
, Adnan Sohail
, Muddesar Iqbal:
Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks. 49 - Shaoquan Jiang:
Quantum Security of a Compact Multi-Signature. 50 - Laerte Peotta de Melo
, Dino Macedo Amaral
, Robson de Oliveira Albuquerque
, Rafael Timóteo de Sousa Júnior
, Ana Lucila Sandoval Orozco
, Luis Javier García-Villalba
:
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol. 51 - Ghassan Hameed Faraj
, Kamal Shahtalebi
, Hamid Mala
:
An Anonymous Authenticated Key Agreement Scheme for Telecare Medical Information Systems. 52 - Luigi Catuogno, Clemente Galdi
:
Implantable Medical Device Security. 53 - Evaristo José Madarro-Capó, Carlos Miguel Legón-Pérez
, Guillermo Sosa Gómez
, Omar Rojas
:
New Weak Keys with Parity Patterns in the RC4 Stream Cipher. 54 - Indrakanti Aishwarya
, Lakshmy Koduvayur Viswanathan, Chungath Srinivasan, Girish Mishra
, Saibal K. Pal, M. Sethumadhavan:
Improving the Security of the LCB Block Cipher Against Deep Learning-Based Attacks. 55 - Luis Adrián Lizama-Pérez
:
A Matrix Multiplication Approach to Quantum-Safe Cryptographic Systems. 56 - Chen Wang
, Zi-Yuan Liu, Masahiro Mambo:
On the Proof of Ownership of Digital Wallets. 57 - Shengnan Zhao, Chuan Zhao, Yuchen Huang
, Xiangfu Song, Qiuliang Xu:
Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives. 58

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.