Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptography/cryptography7.bht:"
@article{DBLP:journals/cryptography/AbuFarajAOAAAA23, author = {Mua'ad Abu{-}Faraj and Abeer Y. Al{-}Hyari and Charlie Obimbo and Khaled Aldebei and Ismail Al{-}Taharwa and Ziad A. Alqadi and Orabe Almanaseer}, title = {Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {20}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020020}, doi = {10.3390/CRYPTOGRAPHY7020020}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AbuFarajAOAAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Alawatugoda23, author = {Janaka Alawatugoda}, title = {Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {1}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010001}, doi = {10.3390/CRYPTOGRAPHY7010001}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Alawatugoda23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlmukhlifiV23, author = {Reham Almukhlifi and Poorvi L. Vora}, title = {Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {8}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010008}, doi = {10.3390/CRYPTOGRAPHY7010008}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlmukhlifiV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlupothaBM23, author = {Jayamine Alupotha and Xavier Boyen and Matthew McKague}, title = {{LACT+:} Practical Post-Quantum Scalable Confidential Transactions}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {24}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020024}, doi = {10.3390/CRYPTOGRAPHY7020024}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlupothaBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AmpatzisA23, author = {Michael Ampatzis and Theodore Andronikos}, title = {Quantum Secret Aggregation Utilizing a Network of Agents}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {5}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010005}, doi = {10.3390/CRYPTOGRAPHY7010005}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AmpatzisA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AndronikosS23, author = {Theodore Andronikos and Alla Sirokofskich}, title = {One-to-Many Simultaneous Secure Quantum Information Transmission}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {64}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040064}, doi = {10.3390/CRYPTOGRAPHY7040064}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/AndronikosS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AugustS23, author = {David A. August and Anne C. Smith}, title = {PudgyTurtle Mode Resists Bit-Flipping Attacks}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {25}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020025}, doi = {10.3390/CRYPTOGRAPHY7020025}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AugustS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BespalovKNOV23, author = {Yuri Bespalov and Lyudmila Kovalchuk and Hanna Nelasa and Roman Oliynykov and Rob Viglione}, title = {Models for Generation of Proof Forest in zk-SNARK Based Sidechains}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {14}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010014}, doi = {10.3390/CRYPTOGRAPHY7010014}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BespalovKNOV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BikosNPS23, author = {Anastasios N. Bikos and Panagiotis E. Nastou and Georgios Petroudis and Yannis C. Stamatiou}, title = {Random Number Generators: Principles and Applications}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {54}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040054}, doi = {10.3390/CRYPTOGRAPHY7040054}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BikosNPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BoudabraN23, author = {Maher Boudabra and Abderrahmane Nitaj}, title = {A New {RSA} Variant Based on Elliptic Curves}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {37}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030037}, doi = {10.3390/CRYPTOGRAPHY7030037}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BoudabraN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CamachoRuizMSB23, author = {Eros Camacho{-}Ruiz and Macarena C. Mart{\'{\i}}nez{-}Rodr{\'{\i}}guez and Santiago S{\'{a}}nchez{-}Solano and Piedad Brox}, title = {Timing-Attack-Resistant Acceleration of {NTRU} Round 3 Encryption on Resource-Constrained Embedded Systems}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {29}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020029}, doi = {10.3390/CRYPTOGRAPHY7020029}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CamachoRuizMSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CatuognoG23, author = {Luigi Catuogno and Clemente Galdi}, title = {Secure Firmware Update: Challenges and Solutions}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {30}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020030}, doi = {10.3390/CRYPTOGRAPHY7020030}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CatuognoG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Cesati23, author = {Marco Cesati}, title = {A New Idea for {RSA} Backdoors}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {45}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030045}, doi = {10.3390/CRYPTOGRAPHY7030045}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Cesati23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ClearT23, author = {Michael Clear and Hitesh Tewari}, title = {Anonymous Homomorphic {IBE} with Application to Anonymous Aggregation}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {22}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020022}, doi = {10.3390/CRYPTOGRAPHY7020022}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ClearT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DamTHPH23, author = {Duc{-}Thuan Dam and Thai{-}Ha Tran and Van{-}Phuc Hoang and Cong{-}Kha Pham and Trong{-}Thuc Hoang}, title = {A Survey of Post-Quantum Cryptography: Start of a New Race}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {40}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030040}, doi = {10.3390/CRYPTOGRAPHY7030040}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DamTHPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DamodharanMS23, author = {Jamunarani Damodharan and Emalda Roslin Susai Michael and Nasir Shaikh{-}Husin}, title = {High Throughput {PRESENT} Cipher Hardware Architecture for the Medical IoT Applications}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {6}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010006}, doi = {10.3390/CRYPTOGRAPHY7010006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DamodharanMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DeCusatisGIPPV23, author = {Casimer M. DeCusatis and Brian Gormanly and John Iacino and Reed Percelay and Alex Pingue and Justin Valdez}, title = {Cybersecurity Test Bed for Smart Contracts}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {15}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010015}, doi = {10.3390/CRYPTOGRAPHY7010015}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DeCusatisGIPPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DolmetaMM23, author = {Alessandra Dolmeta and Maurizio Martina and Guido Masera}, title = {Comparative Study of Keccak {SHA-3} Implementations}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {60}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040060}, doi = {10.3390/CRYPTOGRAPHY7040060}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DolmetaMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DuanLL23, author = {Li Duan and Yong Li and Lijun Liao}, title = {Practical Certificate-Less Infrastructure with Application in {TLS}}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {63}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040063}, doi = {10.3390/CRYPTOGRAPHY7040063}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DuanLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DunmoreSJ23, author = {Aeryn Dunmore and Juliet Samandari and Julian Jang{-}Jaccard}, title = {Matrix Encryption Walks for Lightweight Cryptography}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {41}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030041}, doi = {10.3390/CRYPTOGRAPHY7030041}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DunmoreSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FengL23, author = {Tao Feng and Yufeng Liu}, title = {Research on PoW Protocol Security under Optimized Long Delay Attack}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {32}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020032}, doi = {10.3390/CRYPTOGRAPHY7020032}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FengL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GuoLJWF23, author = {Xian Guo and Ye Li and Yongbo Jiang and Jing Wang and Junli Fang}, title = {Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {59}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040059}, doi = {10.3390/CRYPTOGRAPHY7040059}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GuoLJWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GuoZGQL23, author = {Yihong Guo and Jinxin Zuo and Ziyu Guo and Jiahao Qi and Yueming Lu}, title = {Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {11}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010011}, doi = {10.3390/CRYPTOGRAPHY7010011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GuoZGQL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HaddadPCLB23, author = {Joseph Haddad and Nikolaos Pitropakis and Christos Chrysoulas and Mouad Lemoudden and William J. Buchanan}, title = {Attacking Windows Hello for Business: Is It What We Were Promised?}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {9}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010009}, doi = {10.3390/CRYPTOGRAPHY7010009}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HaddadPCLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HeF23, author = {Buzhen He and Tao Feng}, title = {Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {16}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020016}, doi = {10.3390/CRYPTOGRAPHY7020016}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HeF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HuL23, author = {Hwai{-}Tsu Hu and Tung{-}Tsun Lee}, title = {Hiding Full-Color Images into Audio with Visual Enhancement via Residual Networks}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {47}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040047}, doi = {10.3390/CRYPTOGRAPHY7040047}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/HuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KangS23, author = {Jeong Hwa Kang and Minhye Seo}, title = {Enhanced Authentication for Decentralized IoT Access Control Architecture}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {42}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030042}, doi = {10.3390/CRYPTOGRAPHY7030042}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KangS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KhashanKAAAAA23, author = {Osama Ahmed Khashan and Nour Mahmoud Khafajah and Waleed Alomoush and Mohammad Alshinwan and Sultan Alamri and Samer Atawneh and Mutasem K. Alsmadi}, title = {Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {12}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010012}, doi = {10.3390/CRYPTOGRAPHY7010012}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KhashanKAAAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KodukhovPKKPV23, author = {Aleksei D. Kodukhov and Valeria A. Pastushenko and Nikita S. Kirsanov and Dmitry A. Kronberg and Markus Pflitsch and Valerii M. Vinokur}, title = {Boosting Quantum Key Distribution via the End-to-End Loss Control}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {38}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030038}, doi = {10.3390/CRYPTOGRAPHY7030038}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KodukhovPKKPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KorziliusS23, author = {Stan Korzilius and Berry Schoenmakers}, title = {Divisions and Square Roots with Tight Error Analysis from Newton-Raphson Iteration in Secure Fixed-Point Arithmetic}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {43}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030043}, doi = {10.3390/CRYPTOGRAPHY7030043}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KorziliusS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KoyamaTFBT23, author = {Atsuki Koyama and Van Chuong Tran and Manato Fujimoto and Vo Nguyen Quoc Bao and Thi Hong Tran}, title = {A Decentralized {COVID-19} Vaccine Tracking System Using Blockchain Technology}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {13}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010013}, doi = {10.3390/CRYPTOGRAPHY7010013}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KoyamaTFBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KulkarniKTIB23, author = {Pallavi Kulkarni and Rajashri Khanai and Dattaprasad Torse and Nalini Iyer and Gururaj Bindagi}, title = {Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {23}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020023}, doi = {10.3390/CRYPTOGRAPHY7020023}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KulkarniKTIB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KurokawaISYU23, author = {Takashi Kurokawa and Takuma Ito and Naoyuki Shinohara and Akihiro Yamamura and Shigenori Uchiyama}, title = {Selection Strategy of F4-Style Algorithm to Solve {MQ} Problems Related to {MPKC}}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {10}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010010}, doi = {10.3390/CRYPTOGRAPHY7010010}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KurokawaISYU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LataC23, author = {Kusum Lata and Linga Reddy Cenkeramaddi}, title = {FPGA-Based {PUF} Designs: {A} Comprehensive Review and Comparative Analysis}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {55}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040055}, doi = {10.3390/CRYPTOGRAPHY7040055}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LataC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LeeGSAL23, author = {Cheng{-}Chi Lee and Mehdi Gheisari and Mohammad Javad Shayegan and Milad Taleby Ahvanooey and Yang Liu}, title = {Privacy-Preserving Techniques in Cloud/Fog and Internet of Things}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {51}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040051}, doi = {10.3390/CRYPTOGRAPHY7040051}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LeeGSAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LeevikDB23, author = {Anton Leevik and Vadim Davydov and Sergey Bezzateev}, title = {Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {33}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030033}, doi = {10.3390/CRYPTOGRAPHY7030033}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LeevikDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LellaS23, author = {Eufemia Lella and Giovanni Schmid}, title = {On the Security of Quantum Key Distribution Networks}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {53}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040053}, doi = {10.3390/CRYPTOGRAPHY7040053}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LellaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Li23, author = {Yamin Li}, title = {Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {57}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040057}, doi = {10.3390/CRYPTOGRAPHY7040057}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LinLW23, author = {Je{-}Kuan Lin and Wun{-}Ting Lin and Ja{-}Ling Wu}, title = {Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {28}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020028}, doi = {10.3390/CRYPTOGRAPHY7020028}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LinLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LiuHTTHY23, author = {Jinhui Liu and Tianyi Han and Maolin Tan and Bo Tang and Wei Hu and Yong Yu}, title = {A Publicly Verifiable E-Voting System Based on Biometrics}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {62}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040062}, doi = {10.3390/CRYPTOGRAPHY7040062}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LiuHTTHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LizamaPerez23, author = {Luis Adri{\'{a}}n Lizama{-}P{\'{e}}rez}, title = {{XOR} Chain and Perfect Secrecy at the Dawn of the Quantum Era}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {50}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040050}, doi = {10.3390/CRYPTOGRAPHY7040050}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LizamaPerez23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MaimutT23, author = {Diana Maimut and George Teseleanu}, title = {Inferring Bivariate Polynomials for Homomorphic Encryption Application}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {31}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020031}, doi = {10.3390/CRYPTOGRAPHY7020031}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MaimutT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MezinaO23, author = {Anzhelika Mezina and Aleksandr Ometov}, title = {Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {34}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030034}, doi = {10.3390/CRYPTOGRAPHY7030034}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/MezinaO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MohanA23, author = {Navya Mohan and J. P. Anita}, title = {Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {4}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010004}, doi = {10.3390/CRYPTOGRAPHY7010004}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MohanA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NagarajanRTKG23, author = {Karthikeyan Nagarajan and Rupshali Roy and Rasit Onur Topaloglu and Sachhidh Kannan and Swaroop Ghosh}, title = {{SCANN:} Side Channel Analysis of Spiking Neural Networks}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {17}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020017}, doi = {10.3390/CRYPTOGRAPHY7020017}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NagarajanRTKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NguyenPH23, author = {Trong{-}Hung Nguyen and Cong{-}Kha Pham and Trong{-}Thuc Hoang}, title = {A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {46}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040046}, doi = {10.3390/CRYPTOGRAPHY7040046}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/NguyenPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NicholasATS23, author = {Geraldine Shirley Nicholas and Dhruvakumar Vikas Aklekar and Bhavin Thakar and Fareena Saqib}, title = {Secure Instruction and Data-Level Information Flow Tracking Model for {RISC-V}}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {58}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040058}, doi = {10.3390/CRYPTOGRAPHY7040058}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/NicholasATS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NitajR23, author = {Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Applications of Neural Network-Based {AI} in Cryptography}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {39}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030039}, doi = {10.3390/CRYPTOGRAPHY7030039}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/NitajR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Office23, author = {Cryptography Editorial Office}, title = {Acknowledgment to the Reviewers of Cryptography in 2022}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010003}, doi = {10.3390/CRYPTOGRAPHY7010003}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Office23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PapadopoulosW23, author = {Iason Papadopoulos and Jiabo Wang}, title = {Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {2}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010002}, doi = {10.3390/CRYPTOGRAPHY7010002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PapadopoulosW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ParkKM23, author = {Seonghwan Park and Hyunil Kim and Inkyu Moon}, title = {Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {35}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030035}, doi = {10.3390/CRYPTOGRAPHY7030035}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/ParkKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ParrillaGCRM23, author = {Luis Parrilla and Antonio Garc{\'{\i}}a and Encarnaci{\'{o}}n Castillo and Juan Antonio L{\'{o}}pez Ramos and Uwe Meyer{-}Baese}, title = {Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {26}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020026}, doi = {10.3390/CRYPTOGRAPHY7020026}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ParrillaGCRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PereiraTSMSP23, author = {Bruno Miguel Batista Pereira and Jos{\'{e}} Manuel Torres and Pedro Miguel Sobral and Rui S. Moreira and Christophe Pinto de Almeida Soares and Ivo Pereira}, title = {Blockchain-Based Electronic Voting: {A} Secure and Transparent Solution}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {27}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020027}, doi = {10.3390/CRYPTOGRAPHY7020027}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PereiraTSMSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RameshDSASS23, author = {Raghunandan Ramesh and Radhakrishna Dodmane and Surendra Shetty and Ganesh Aithal and Monalisa Sahu and Aditya Kumar Sahu}, title = {A Novel and Secure Fake-Modulus Based Rabin-{\cyrchar\CYRABHDZE} Cryptosystem}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {44}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030044}, doi = {10.3390/CRYPTOGRAPHY7030044}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/RameshDSASS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SalaS23, author = {Riccardo Della Sala and Giuseppe Scotti}, title = {A Novel {FPGA} Implementation of the {NAND-PUF} with Minimal Resource Usage and High Reliability}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {18}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020018}, doi = {10.3390/CRYPTOGRAPHY7020018}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SalaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SchoenmakersS23, author = {Berry Schoenmakers and Toon Segers}, title = {Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {56}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040056}, doi = {10.3390/CRYPTOGRAPHY7040056}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SchoenmakersS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SoroceanuBM23, author = {Tudor A. A. Soroceanu and Nicolas Buchmann and Marian Margraf}, title = {On Multiple Encryption for Public-Key Cryptography}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {49}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040049}, doi = {10.3390/CRYPTOGRAPHY7040049}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SoroceanuBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Taherdoost23, author = {Hamed Taherdoost}, title = {The Role of Blockchain in Medical Data Sharing}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {36}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030036}, doi = {10.3390/CRYPTOGRAPHY7030036}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Taherdoost23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TahirQKLA23, author = {Mehwish Tahir and Yuansong Qiao and Nadia Kanwal and Brian Lee and Mamoona Naveed Asghar}, title = {Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {7}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010007}, doi = {10.3390/CRYPTOGRAPHY7010007}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TahirQKLA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TrivediBKT23, author = {Devharsh Trivedi and Aymen Boudguiga and Nesrine Kaaniche and Nikos Triandopoulos}, title = {SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {52}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040052}, doi = {10.3390/CRYPTOGRAPHY7040052}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/TrivediBKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/WalskaarTC23, author = {Ivar Walskaar and Minh Christian Tran and Ferhat {\"{O}}zg{\"{u}}r {\c{C}}atak}, title = {A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {48}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040048}, doi = {10.3390/CRYPTOGRAPHY7040048}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/WalskaarTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/YuMM23, author = {Mingfei Yu and Dewmini Sudara Marakkalage and Giovanni De Micheli}, title = {Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {61}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040061}, doi = {10.3390/CRYPTOGRAPHY7040061}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/YuMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Zajac23, author = {Pavol Zajac}, title = {Algebraic Cryptanalysis with {MRHS} Equations}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {19}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020019}, doi = {10.3390/CRYPTOGRAPHY7020019}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Zajac23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZhouZWCZ23, author = {Quan Zhou and Yulong Zheng and Kaijun Wei and Minhui Chen and Zhikang Zeng}, title = {A Multi-Party Functional Signatures Scheme for Private Blockchain}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {21}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020021}, doi = {10.3390/CRYPTOGRAPHY7020021}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ZhouZWCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.