


default search action
Cryptography, Volume 9
Volume 9, Number 1, 2024
- Mohammad Anagreh

, Peeter Laud
:
Security Proof of Single-Source Shortest Distance Protocols Built on Secure Multiparty Computation Protocols. 1 - George Teseleanu

:
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems. 2 - Jihane Jebrane

, Akram Chhaybi
, Saiida Lazaar
, Abderrahmane Nitaj
:
Elliptic Curve Cryptography with Machine Learning. 3 - Ching-Chun Chang, Yijie Lin, Jui-Chuan Liu, Chin-Chen Chang:

Reversible Data Hiding in Absolute Moment Block Truncation Codes via Arithmetical and Logical Differential Coding. 4
Volume 9, Number 1, 2025
- Vincent Meyers

, Michael Hefenbrock
, Dennis Gnad
, Mehdi B. Tahoori
:
Leveraging Neural Trojan Side-Channels for Output Exfiltration. 5 - Jiaming Wu

, Olivia P. Dizon-Paradis
, M. Sazadur Rahman, Damon L. Woodard
, Domenic Forte
:
Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation. 6 - Thekaa Ali Kadhim, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi

, Zahraa Abdullah Ali, Iman Qays Abduljaleel
:
Lightweight Scheme for Secure Signaling and Data Exchanges in Intelligent Precision Agriculture. 7 - Madusha Chathurangi

, Qinyi Li, Ernest Foo:
On Advances of Anonymous Credentials - From Traditional to Post-Quantum. 8 - Hsia-Hung Ou, Guan-Yu Chen, Iuon-Chang Lin

:
A Self-Sovereign Identity Blockchain Framework for Access Control and Transparency in Financial Institutions. 9 - Xiaoqi Liu

, Guillermo Morales-Luna
:
On the Effectiveness of a Common Attack to Chebyshev Chaotic Encryption Scheme. 10 - Marta Irene García Cid

, Rodrigo Martín
, David Domingo, Vicente Martín, Laura Ortíz:
Design and Implementation of a Quantum-Assisted Digital Signature. 11 - Mojtaba Fadavi, Sabyasachi Karati, Aylar Erfanian, Reihaneh Safavi-Naini

:
DGMT: A Fully Dynamic Group Signature from Symmetric-Key Primitives. 12 - Ming Luo

, Mingsheng Wang:
Faster Spiral: Low-Communication, High-Rate Private Information Retrieval. 13 - Kung-Wei Hu

, Huan-Chih Wang
, Wun-Ting Lin
, Ja-Ling Wu
:
Optimizing Message Range and Ciphertext Storage in Gentry-Sahai-Waters Encryption Using Chinese Remainder Theorem and PVW-like Compression Scheme. 14 - Qinming Zhou, Haozhi Xie, Tao Su

:
The Impact of Clock Frequencies on Remote Power Side-Channel Analysis Attack Resistance of Processors in Multi-Tenant FPGAs. 15 - Vasiliki Liagkou

, Panagiotis E. Nastou, Paul G. Spirakis
, Yannis C. Stamatiou:
Construction of Countably Infinite Programs That Evade Malware/Non-Malware Classification for Any Given Formal System. 16 - Hamed Taherdoost

, Tuan-Vinh Le
, Khadija Slimani
:
Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review. 17 - Xinyue Zhang, Daoguang Mu, Wenzheng Zhang, Xinfeng Dong:

Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework. 18 - Costin Ghiban, Marios Omar Choudary:

Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation. 19 - Rares Ifrim

, Decebal Popescu
:
BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis. 20
Volume 9, Number 2, 2025
- Phuc-Phan Duong

, Tuan-Kiet Dang
, Trong-Thuc Hoang, Cong-Kha Pham
:
Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24). 21 - Dahhak Hajar

, Nadia Afifi, Imane Hilal
:
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience. 22 - Xiansong Qian

, Lifei Wei
, Jinjiao Zhang
, Lei Zhang
:
Malicious-Secure Threshold Multi-Party Private Set Intersection for Anonymous Electronic Voting. 23 - Manar Alnasser, Shancang Li:

Privacy-Enhancing Technologies in Collaborative Healthcare Analysis. 24 - Ottó Hanyecz

, András Bodor
, Peter Adam
, Mátyás Koniorczyk
:
Bell-Clauser-Horne-Shimony-Holt Behavior Under Quantum Loss and Decoherence. 25 - Mykhailo Kasianchuk, Ruslan Shevchuk

, Bogdan Adamyk
, Vladlena Benson, Inna Shylinska, Mykhailo Holembiovskyi:
Affine Cipher Encryption Technique Using Residue Number System. 26 - Alex Shafarenko

:
Non-Degenerate One-Time Pad and Unconditional Integrity of Perfectly Secret Messages. 27 - Iuon-Chang Lin

, Ko-Yu Lin, Nan-I Wu, Min-Shiang Hwang
:
A Quantum Key Distribution for Securing Smart Grids. 28 - Anastasios N. Bikos

:
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels. 29 - Hanbing Li, Kexin Qiao

, Ye Xu, Changhai Ou
, An Wang
:
General Extensions and Improvements of Algebraic Persistent Fault Analysis. 30 - Siddhartha Siddhiprada Bhoi

, Arathi Arakala
, Amy Beth Corman
, Asha Rao
:
Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives. 31 - Maryam Abbasi

, Filipe Gonçalves Cardoso
, Paulo Váz
, José Silva
, Pedro Martins:
A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments. 32 - William J. Buchanan

, Hisham Ali
:
Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption. 33 - Venkata K. V. V. Bathalapalli

, Saraju P. Mohanty
, Chenyun Pan
, Elias Kougianos
:
QPUF: Quantum Physical Unclonable Functions for Security-by-Design of Industrial Internet-of-Things. 34 - Salem AlJanah

, Ning Zhang
, Siok Wah Tay
:
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications. 35 - Zulfikar Zulfikar

, Hubbul Walidainy, Aulia Rahman
, Kahlil Muchtar
:
Reliability Improvement of 28 nm Intel FPGA Ring Oscillator PUF for Chip Identification. 36 - Atef Ibrahim

, Fayez Gebali:
Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers. 37 - Manohar Raavi

, Qaiser Khan
, Simeon Wuthier
, Pranav Chandramouli, Yaroslav Balytskyi
, Sang-Yoon Chang
:
Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations. 38 - Ali Abdullah S. AlQahtani

:
Key Derivation: A Dynamic PBKDF2 Model for Modern Cryptographic Systems. 39 - Mohammed Rahmani

, Abderrahmane Nitaj
, Abdelhamid Tadmori
, M'hammed Ziane:
An Improved Attack on the RSA Variant Based on Cubic Pell Equation. 40 - Bo Mi

, Siyuan Zeng, Ran Zeng, Fuyuan Wang, Qi Zhou:
Multiparty Homomorphic Encryption for IoV Based on Span Program and Conjugate Search Problem. 41 - Dawoon Kwon

, Junghwan Song:
Computing the Differential Probability of a Word-Based Block Cipher. 42 - Cheng-Chi Lee

, Tuan-Vinh Le
, Chun-Ta Li
, Dinh-Thuan Do, Agbotiname Lucky Imoize
:
Advances in Authentication, Authorization and Privacy for Securing Smart Communications. 43 - Dongfang Zhao:

Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis. 44 - Ismel Martínez-Díaz

, Carlos Miguel Legón-Pérez
, Guillermo Sosa-Gómez
:
Generation of Affine-Shifted S-Boxes with Constant Confusion Coefficient Variance and Application in the Partitioning of the S-Box Space. 45 - Hai Huang, Jiwen Zheng, Zhengyu Chen, Shilei Zhao, Hongwei Wu, Bin Yu, Zhiwei Liu:

Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems. 46
Volume 9, Number 3, 2025
- Holger Mandry

, Julian Spiess, Bjoern Driemeyer
, Joachim Becker
, Maurits Ortmanns
:
The Eye-Opening Arbiter-PUF FPGA Implementation with Auto Error Detection. 47 - Nikola Hristov-Kalamov

, Raúl Fernández-Ruiz
, Agustín Álvarez-Marquina, Julio Guillen-Garcia
, Roberto Gallardo-Cava
, Daniel Palacios-Alonso
:
Composable Privacy-Preserving Framework for Stakes-Based Online Peer-to-Peer Applications. 48 - Ran Chu

, Jun Mou
, Yuanhui Cui:
Image Encryption with Dual Watermark Based on Chaotic Map. 49 - Dongyu Wu

, Bei Liang
, Zijie Lu
, Jintai Ding
:
Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applications. 50 - Xinyao Li

, Akhilesh Tyagi
:
Multi-Line Prefetch Covert Channel with Huge Pages. 51 - Abdul Ghafoor

, Iraklis Symeonidis
, Anna Rydberg
, Cecilia Lindahl
, Abdul Qadus Abbasi:
Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing. 52 - Sana Challi, Mukul Kulkarni, Taoufik Serraj:

A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP. 53 - Afef Kchaou

, Sehmi Saad
, Hatem Garrab, Mohsen Machhout:
Reliability of LEON3 Processor's Program Counter Against SEU, MBU, and SET Fault Injection. 54 - Kung-Wei Hu

, Wun-Ting Lin
, Huan-Chih Wang
, Ja-Ling Wu
:
Enhancing the Multikey GSW Scheme with CRT Decomposition and Ciphertext Compression for Efficient Distributed Decryption. 55 - Sunil Kumar, Dharminder Chaudhary, S. A. Lakshmanan

, Cheng-Chi Lee
:
Novel Approach to Degree, Balancedness, and Affine Equivalence of Boolean Functions and Construction of a Special Class of Non-Quadratic Balanced Boolean Functions. 56 - Xiyuan Cheng, Tiancong Cheng, Xinyu Yang, Wenbin Cheng

, Yiting Lin
:
A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography. 57 - Alexandru Dinu

:
From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography. 58 - Kwan Yin Chan

, Tsz Hon Yuen
, Siu Ming Yiu:
Universally Composable Traceable Ring Signature with Verifiable Random Function in Logarithmic Size. 59
Volume 9, Number 4, 2025
- Sidra Anwar

, Jonathan Anderson
:
Privacy-Driven Classification of Contact Tracing Platforms: Architecture and Adoption Insights. 60 - Hanwei Qian, Lingling Xia, Ruihao Ge, Yiming Fan, Qun Wang, Zhengjun Jing

:
From Black Boxes to Glass Boxes: Explainable AI for Trustworthy Deepfake Forensics. 61 - Altana Khutsaeva

, Anton Leevik
, Sergey Bezzateev
:
A Survey of Post-Quantum Oblivious Protocols. 62 - Noha E. El-Attar, Marwa H. Salama

, Mohamed Abdelfattah, Sanaa Taha:
An Optimized Framework for Detecting Suspicious Accounts in the Ethereum Blockchain Network. 63 - Munkhbaatar Chinbat

, Liji Wu, Xiangmin Zhang, Yifan Yang, Man Wei:
Comparative Deep Learning-Based Side-Channel Analysis of an FPGA-Based CRYSTALS-Kyber NTT Accelerator. 64 - Ling-Ling Xia

, Tao Zhu, Zhengjun Jing
, Qun Wang, Zhuo Ma, Zimo Huang, Ziyu Yin:
A Two-Layer Transaction Network-Based Method for Virtual Currency Address Identity Recognition. 65 - Anas Ahmad Abudaqa

, Khaled Alshehri, Muhamad Felemban
:
On the Homomorphic Properties of Kyber and McEliece with Application to Post-Quantum Private Set Intersection. 66 - Phuc-Phan Duong

, Cong-Kha Pham
:
Constructing 8 × 8 S-Boxes with Optimal Boolean Function Nonlinearity. 67 - Saloni Jain, Amisha Bagri, Maxime Cambou

, Dina Ghanai Miandoab, Bertrand Cambou
:
Enhancing Multi-Factor Authentication with Templateless 2D/3D Biometrics and PUF Integration for Securing Smart Devices. 68 - Shaobo Zhang

, Yijie Yin
, Nangui Chen, Honghui Ning:
A Lightweight Decentralized Medical Data Sharing Scheme with Dual Verification. 69 - Hussain Ahmad

, Carolin Hannusch
:
A Scalable Symmetric Cryptographic Scheme Based on Latin Square, Permutations, and Reed-Muller Codes for Resilient Encryption. 70 - Shaomin Zhang, Yiheng Huang

, Baoyi Wang:
A Privacy-Preserving Scheme for V2V Double Auction Power Trading Based on Heterogeneous Signcryption and IoV. 71 - David Palma

, Pier Luca Montessoro
:
A Post-Quantum Cryptography Enabled Feature-Level Fusion Framework for Privacy-Preserving Multimodal Biometric Recognition. 72 - Konstantina Souvatzidaki, Konstantinos Limniotis

:
Post-Quantum Key Exchange in TLS 1.3: Further Analysis on Performance of New Cryptographic Standards. 73 - Firdous Kausar

, Hafiz M. Asif
, Sajid Hussain, Shahid Mumtaz:
A Review on Blockchain-Based Trust and Reputation Schemes in Metaverse Environments. 74 - Yuheng Qian, Jing Gao, Yuhan Qian, Yaoling Ding, An Wang:

STAR: Self-Training Assisted Refinement for Side-Channel Analysis on Cryptosystems. 75 - Saba Karimani, Taraneh Eghlidos

:
Verifiable Multi-Authority Attribute-Based Encryption with Keyword Search Based on MLWE. 76 - Márcio Carvalho, Filipe Sá

, Jorge Bernardino
:
Evaluation of the Impact of AES Encryption on Query Read Performance Across Oracle, MySQL, and SQL Server Databases. 77 - Oussama Azzouzi

, Mohamed Anane, Mohamed Chahine Ghanem
, Yassine Himeur
, Dominik Wojtczak
:
Flexible and Area-Efficient Codesign Implementation of AES on FPGA. 78 - Ngoc Ai Van Nguyen

, Dung Hoang Duong
, Minh Thuy Truc Pham:
Efficient CCA2-Secure IBKEM from Lattices in the Standard Model. 79 - Yixuan He

, Yuta Kodera
, Yasuyuki Nogami
, Samsul Huda
:
Role-Based Efficient Proactive Secret Sharing with User Revocation. 80

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














