


default search action
Cryptography, Volume 9
Volume 9, Number 1, 2024
- Mohammad Anagreh
, Peeter Laud
:
Security Proof of Single-Source Shortest Distance Protocols Built on Secure Multiparty Computation Protocols. 1 - George Teseleanu
:
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems. 2 - Jihane Jebrane
, Akram Chhaybi
, Saiida Lazaar
, Abderrahmane Nitaj
:
Elliptic Curve Cryptography with Machine Learning. 3 - Ching-Chun Chang, Yijie Lin, Jui-Chuan Liu, Chin-Chen Chang:
Reversible Data Hiding in Absolute Moment Block Truncation Codes via Arithmetical and Logical Differential Coding. 4
Volume 9, Number 1, 2025
- Vincent Meyers
, Michael Hefenbrock
, Dennis Gnad
, Mehdi B. Tahoori
:
Leveraging Neural Trojan Side-Channels for Output Exfiltration. 5 - Jiaming Wu
, Olivia P. Dizon-Paradis, M. Sazadur Rahman, Damon L. Woodard
, Domenic Forte
:
Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation. 6 - Thekaa Ali Kadhim, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi
, Zahraa Abdullah Ali, Iman Qays Abduljaleel
:
Lightweight Scheme for Secure Signaling and Data Exchanges in Intelligent Precision Agriculture. 7 - Madusha Chathurangi
, Qinyi Li, Ernest Foo:
On Advances of Anonymous Credentials - From Traditional to Post-Quantum. 8 - Hsia-Hung Ou, Guan-Yu Chen, Iuon-Chang Lin
:
A Self-Sovereign Identity Blockchain Framework for Access Control and Transparency in Financial Institutions. 9 - Xiaoqi Liu
, Guillermo Morales-Luna
:
On the Effectiveness of a Common Attack to Chebyshev Chaotic Encryption Scheme. 10 - Marta Irene García Cid
, Rodrigo Martín, David Domingo, Vicente Martín, Laura Ortíz:
Design and Implementation of a Quantum-Assisted Digital Signature. 11 - Mojtaba Fadavi, Sabyasachi Karati, Aylar Erfanian, Reihaneh Safavi-Naini
:
DGMT: A Fully Dynamic Group Signature from Symmetric-Key Primitives. 12 - Ming Luo
, Mingsheng Wang:
Faster Spiral: Low-Communication, High-Rate Private Information Retrieval. 13 - Kung-Wei Hu
, Huan-Chih Wang
, Wun-Ting Lin, Ja-Ling Wu
:
Optimizing Message Range and Ciphertext Storage in Gentry-Sahai-Waters Encryption Using Chinese Remainder Theorem and PVW-like Compression Scheme. 14 - Qinming Zhou, Haozhi Xie, Tao Su
:
The Impact of Clock Frequencies on Remote Power Side-Channel Analysis Attack Resistance of Processors in Multi-Tenant FPGAs. 15 - Vasiliki Liagkou
, Panagiotis E. Nastou, Paul G. Spirakis
, Yannis C. Stamatiou:
Construction of Countably Infinite Programs That Evade Malware/Non-Malware Classification for Any Given Formal System. 16 - Hamed Taherdoost
, Tuan-Vinh Le
, Khadija Slimani
:
Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review. 17 - Xinyue Zhang, Daoguang Mu, Wenzheng Zhang, Xinfeng Dong:
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework. 18 - Costin Ghiban, Marios Omar Choudary:
Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation. 19 - Rares Ifrim
, Decebal Popescu
:
BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis. 20
Volume 9, Number 2, 2025
- Phuc-Phan Duong
, Tuan-Kiet Dang
, Trong-Thuc Hoang, Cong-Kha Pham
:
Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24). 21 - Dahhak Hajar
, Nadia Afifi, Imane Hilal
:
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience. 22 - Xiansong Qian
, Lifei Wei
, Jinjiao Zhang
, Lei Zhang
:
Malicious-Secure Threshold Multi-Party Private Set Intersection for Anonymous Electronic Voting. 23

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.