Search dblp for Publications

export results for "toc:db/journals/cryptography/cryptography7.bht:"

 download as .bib file

@article{DBLP:journals/cryptography/AbuFarajAOAAAA23,
  author       = {Mua'ad Abu{-}Faraj and
                  Abeer Y. Al{-}Hyari and
                  Charlie Obimbo and
                  Khaled Aldebei and
                  Ismail Al{-}Taharwa and
                  Ziad A. Alqadi and
                  Orabe Almanaseer},
  title        = {Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic
                  Maps},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {20},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020020},
  doi          = {10.3390/CRYPTOGRAPHY7020020},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AbuFarajAOAAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Alawatugoda23,
  author       = {Janaka Alawatugoda},
  title        = {Authenticated Key Exchange Protocol in the Standard Model under Weaker
                  Assumptions},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {1},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010001},
  doi          = {10.3390/CRYPTOGRAPHY7010001},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Alawatugoda23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlmukhlifiV23,
  author       = {Reham Almukhlifi and
                  Poorvi L. Vora},
  title        = {Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {8},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010008},
  doi          = {10.3390/CRYPTOGRAPHY7010008},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlmukhlifiV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlupothaBM23,
  author       = {Jayamine Alupotha and
                  Xavier Boyen and
                  Matthew McKague},
  title        = {{LACT+:} Practical Post-Quantum Scalable Confidential Transactions},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {24},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020024},
  doi          = {10.3390/CRYPTOGRAPHY7020024},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlupothaBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AmpatzisA23,
  author       = {Michael Ampatzis and
                  Theodore Andronikos},
  title        = {Quantum Secret Aggregation Utilizing a Network of Agents},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {5},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010005},
  doi          = {10.3390/CRYPTOGRAPHY7010005},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AmpatzisA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AndronikosS23,
  author       = {Theodore Andronikos and
                  Alla Sirokofskich},
  title        = {One-to-Many Simultaneous Secure Quantum Information Transmission},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {64},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040064},
  doi          = {10.3390/CRYPTOGRAPHY7040064},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/AndronikosS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AugustS23,
  author       = {David A. August and
                  Anne C. Smith},
  title        = {PudgyTurtle Mode Resists Bit-Flipping Attacks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {25},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020025},
  doi          = {10.3390/CRYPTOGRAPHY7020025},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AugustS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BespalovKNOV23,
  author       = {Yuri Bespalov and
                  Lyudmila Kovalchuk and
                  Hanna Nelasa and
                  Roman Oliynykov and
                  Rob Viglione},
  title        = {Models for Generation of Proof Forest in zk-SNARK Based Sidechains},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {14},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010014},
  doi          = {10.3390/CRYPTOGRAPHY7010014},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BespalovKNOV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BikosNPS23,
  author       = {Anastasios N. Bikos and
                  Panagiotis E. Nastou and
                  Georgios Petroudis and
                  Yannis C. Stamatiou},
  title        = {Random Number Generators: Principles and Applications},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {54},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040054},
  doi          = {10.3390/CRYPTOGRAPHY7040054},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BikosNPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BoudabraN23,
  author       = {Maher Boudabra and
                  Abderrahmane Nitaj},
  title        = {A New {RSA} Variant Based on Elliptic Curves},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {37},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030037},
  doi          = {10.3390/CRYPTOGRAPHY7030037},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BoudabraN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CamachoRuizMSB23,
  author       = {Eros Camacho{-}Ruiz and
                  Macarena C. Mart{\'{\i}}nez{-}Rodr{\'{\i}}guez and
                  Santiago S{\'{a}}nchez{-}Solano and
                  Piedad Brox},
  title        = {Timing-Attack-Resistant Acceleration of {NTRU} Round 3 Encryption
                  on Resource-Constrained Embedded Systems},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {29},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020029},
  doi          = {10.3390/CRYPTOGRAPHY7020029},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CamachoRuizMSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CatuognoG23,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  title        = {Secure Firmware Update: Challenges and Solutions},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {30},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020030},
  doi          = {10.3390/CRYPTOGRAPHY7020030},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CatuognoG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Cesati23,
  author       = {Marco Cesati},
  title        = {A New Idea for {RSA} Backdoors},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {45},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030045},
  doi          = {10.3390/CRYPTOGRAPHY7030045},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Cesati23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ClearT23,
  author       = {Michael Clear and
                  Hitesh Tewari},
  title        = {Anonymous Homomorphic {IBE} with Application to Anonymous Aggregation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {22},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020022},
  doi          = {10.3390/CRYPTOGRAPHY7020022},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ClearT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DamTHPH23,
  author       = {Duc{-}Thuan Dam and
                  Thai{-}Ha Tran and
                  Van{-}Phuc Hoang and
                  Cong{-}Kha Pham and
                  Trong{-}Thuc Hoang},
  title        = {A Survey of Post-Quantum Cryptography: Start of a New Race},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {40},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030040},
  doi          = {10.3390/CRYPTOGRAPHY7030040},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DamTHPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DamodharanMS23,
  author       = {Jamunarani Damodharan and
                  Emalda Roslin Susai Michael and
                  Nasir Shaikh{-}Husin},
  title        = {High Throughput {PRESENT} Cipher Hardware Architecture for the Medical
                  IoT Applications},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {6},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010006},
  doi          = {10.3390/CRYPTOGRAPHY7010006},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DamodharanMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DeCusatisGIPPV23,
  author       = {Casimer M. DeCusatis and
                  Brian Gormanly and
                  John Iacino and
                  Reed Percelay and
                  Alex Pingue and
                  Justin Valdez},
  title        = {Cybersecurity Test Bed for Smart Contracts},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {15},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010015},
  doi          = {10.3390/CRYPTOGRAPHY7010015},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DeCusatisGIPPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DolmetaMM23,
  author       = {Alessandra Dolmeta and
                  Maurizio Martina and
                  Guido Masera},
  title        = {Comparative Study of Keccak {SHA-3} Implementations},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {60},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040060},
  doi          = {10.3390/CRYPTOGRAPHY7040060},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DolmetaMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DuanLL23,
  author       = {Li Duan and
                  Yong Li and
                  Lijun Liao},
  title        = {Practical Certificate-Less Infrastructure with Application in {TLS}},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {63},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040063},
  doi          = {10.3390/CRYPTOGRAPHY7040063},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DuanLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DunmoreSJ23,
  author       = {Aeryn Dunmore and
                  Juliet Samandari and
                  Julian Jang{-}Jaccard},
  title        = {Matrix Encryption Walks for Lightweight Cryptography},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {41},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030041},
  doi          = {10.3390/CRYPTOGRAPHY7030041},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DunmoreSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FengL23,
  author       = {Tao Feng and
                  Yufeng Liu},
  title        = {Research on PoW Protocol Security under Optimized Long Delay Attack},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {32},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020032},
  doi          = {10.3390/CRYPTOGRAPHY7020032},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FengL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GuoLJWF23,
  author       = {Xian Guo and
                  Ye Li and
                  Yongbo Jiang and
                  Jing Wang and
                  Junli Fang},
  title        = {Privacy-Preserving k-Nearest Neighbor Classification over Malicious
                  Participants in Outsourced Cloud Environments},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {59},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040059},
  doi          = {10.3390/CRYPTOGRAPHY7040059},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GuoLJWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GuoZGQL23,
  author       = {Yihong Guo and
                  Jinxin Zuo and
                  Ziyu Guo and
                  Jiahao Qi and
                  Yueming Lu},
  title        = {Data Sharing Privacy Metrics Model Based on Information Entropy and
                  Group Privacy Preference},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {11},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010011},
  doi          = {10.3390/CRYPTOGRAPHY7010011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GuoZGQL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HaddadPCLB23,
  author       = {Joseph Haddad and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas and
                  Mouad Lemoudden and
                  William J. Buchanan},
  title        = {Attacking Windows Hello for Business: Is It What We Were Promised?},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {9},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010009},
  doi          = {10.3390/CRYPTOGRAPHY7010009},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HaddadPCLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HeF23,
  author       = {Buzhen He and
                  Tao Feng},
  title        = {Encryption Scheme of Verifiable Search Based on Blockchain in Cloud
                  Environment},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {16},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020016},
  doi          = {10.3390/CRYPTOGRAPHY7020016},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HeF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HuL23,
  author       = {Hwai{-}Tsu Hu and
                  Tung{-}Tsun Lee},
  title        = {Hiding Full-Color Images into Audio with Visual Enhancement via Residual
                  Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {47},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040047},
  doi          = {10.3390/CRYPTOGRAPHY7040047},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/HuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KangS23,
  author       = {Jeong Hwa Kang and
                  Minhye Seo},
  title        = {Enhanced Authentication for Decentralized IoT Access Control Architecture},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {42},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030042},
  doi          = {10.3390/CRYPTOGRAPHY7030042},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KangS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KhashanKAAAAA23,
  author       = {Osama Ahmed Khashan and
                  Nour Mahmoud Khafajah and
                  Waleed Alomoush and
                  Mohammad Alshinwan and
                  Sultan Alamri and
                  Samer Atawneh and
                  Mutasem K. Alsmadi},
  title        = {Dynamic Multimedia Encryption Using a Parallel File System Based on
                  Multi-Core Processors},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {12},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010012},
  doi          = {10.3390/CRYPTOGRAPHY7010012},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KhashanKAAAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KodukhovPKKPV23,
  author       = {Aleksei D. Kodukhov and
                  Valeria A. Pastushenko and
                  Nikita S. Kirsanov and
                  Dmitry A. Kronberg and
                  Markus Pflitsch and
                  Valerii M. Vinokur},
  title        = {Boosting Quantum Key Distribution via the End-to-End Loss Control},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {38},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030038},
  doi          = {10.3390/CRYPTOGRAPHY7030038},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KodukhovPKKPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KorziliusS23,
  author       = {Stan Korzilius and
                  Berry Schoenmakers},
  title        = {Divisions and Square Roots with Tight Error Analysis from Newton-Raphson
                  Iteration in Secure Fixed-Point Arithmetic},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {43},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030043},
  doi          = {10.3390/CRYPTOGRAPHY7030043},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KorziliusS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KoyamaTFBT23,
  author       = {Atsuki Koyama and
                  Van Chuong Tran and
                  Manato Fujimoto and
                  Vo Nguyen Quoc Bao and
                  Thi Hong Tran},
  title        = {A Decentralized {COVID-19} Vaccine Tracking System Using Blockchain
                  Technology},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {13},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010013},
  doi          = {10.3390/CRYPTOGRAPHY7010013},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KoyamaTFBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KulkarniKTIB23,
  author       = {Pallavi Kulkarni and
                  Rajashri Khanai and
                  Dattaprasad Torse and
                  Nalini Iyer and
                  Gururaj Bindagi},
  title        = {Neural Crypto-Coding Based Approach to Enhance the Security of Images
                  over the Untrusted Cloud Environment},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {23},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020023},
  doi          = {10.3390/CRYPTOGRAPHY7020023},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KulkarniKTIB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KurokawaISYU23,
  author       = {Takashi Kurokawa and
                  Takuma Ito and
                  Naoyuki Shinohara and
                  Akihiro Yamamura and
                  Shigenori Uchiyama},
  title        = {Selection Strategy of F4-Style Algorithm to Solve {MQ} Problems Related
                  to {MPKC}},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {10},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010010},
  doi          = {10.3390/CRYPTOGRAPHY7010010},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KurokawaISYU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LataC23,
  author       = {Kusum Lata and
                  Linga Reddy Cenkeramaddi},
  title        = {FPGA-Based {PUF} Designs: {A} Comprehensive Review and Comparative
                  Analysis},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {55},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040055},
  doi          = {10.3390/CRYPTOGRAPHY7040055},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LataC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LeeGSAL23,
  author       = {Cheng{-}Chi Lee and
                  Mehdi Gheisari and
                  Mohammad Javad Shayegan and
                  Milad Taleby Ahvanooey and
                  Yang Liu},
  title        = {Privacy-Preserving Techniques in Cloud/Fog and Internet of Things},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {51},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040051},
  doi          = {10.3390/CRYPTOGRAPHY7040051},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LeeGSAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LeevikDB23,
  author       = {Anton Leevik and
                  Vadim Davydov and
                  Sergey Bezzateev},
  title        = {Threshold Lattice-Based Signature Scheme for Authentication by Wearable
                  Devices},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {33},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030033},
  doi          = {10.3390/CRYPTOGRAPHY7030033},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LeevikDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LellaS23,
  author       = {Eufemia Lella and
                  Giovanni Schmid},
  title        = {On the Security of Quantum Key Distribution Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {53},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040053},
  doi          = {10.3390/CRYPTOGRAPHY7040053},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LellaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Li23,
  author       = {Yamin Li},
  title        = {Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub
                  Based Modular Multiplication Algorithms},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {57},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040057},
  doi          = {10.3390/CRYPTOGRAPHY7040057},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LinLW23,
  author       = {Je{-}Kuan Lin and
                  Wun{-}Ting Lin and
                  Ja{-}Ling Wu},
  title        = {Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based
                  Encryption Schemes},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {28},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020028},
  doi          = {10.3390/CRYPTOGRAPHY7020028},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LinLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LiuHTTHY23,
  author       = {Jinhui Liu and
                  Tianyi Han and
                  Maolin Tan and
                  Bo Tang and
                  Wei Hu and
                  Yong Yu},
  title        = {A Publicly Verifiable E-Voting System Based on Biometrics},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {62},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040062},
  doi          = {10.3390/CRYPTOGRAPHY7040062},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LiuHTTHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LizamaPerez23,
  author       = {Luis Adri{\'{a}}n Lizama{-}P{\'{e}}rez},
  title        = {{XOR} Chain and Perfect Secrecy at the Dawn of the Quantum Era},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {50},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040050},
  doi          = {10.3390/CRYPTOGRAPHY7040050},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LizamaPerez23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MaimutT23,
  author       = {Diana Maimut and
                  George Teseleanu},
  title        = {Inferring Bivariate Polynomials for Homomorphic Encryption Application},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {31},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020031},
  doi          = {10.3390/CRYPTOGRAPHY7020031},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MaimutT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MezinaO23,
  author       = {Anzhelika Mezina and
                  Aleksandr Ometov},
  title        = {Detecting Smart Contract Vulnerabilities with Combined Binary and
                  Multiclass Classification},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {34},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030034},
  doi          = {10.3390/CRYPTOGRAPHY7030034},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/MezinaO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MohanA23,
  author       = {Navya Mohan and
                  J. P. Anita},
  title        = {Early Detection of Clustered Trojan Attacks on Integrated Circuits
                  Using Transition Delay Fault Model},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010004},
  doi          = {10.3390/CRYPTOGRAPHY7010004},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MohanA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NagarajanRTKG23,
  author       = {Karthikeyan Nagarajan and
                  Rupshali Roy and
                  Rasit Onur Topaloglu and
                  Sachhidh Kannan and
                  Swaroop Ghosh},
  title        = {{SCANN:} Side Channel Analysis of Spiking Neural Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {17},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020017},
  doi          = {10.3390/CRYPTOGRAPHY7020017},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NagarajanRTKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NguyenPH23,
  author       = {Trong{-}Hung Nguyen and
                  Cong{-}Kha Pham and
                  Trong{-}Thuc Hoang},
  title        = {A High-Efficiency Modular Multiplication Digital Signal Processing
                  for Lattice-Based Post-Quantum Cryptography},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {46},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040046},
  doi          = {10.3390/CRYPTOGRAPHY7040046},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/NguyenPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NicholasATS23,
  author       = {Geraldine Shirley Nicholas and
                  Dhruvakumar Vikas Aklekar and
                  Bhavin Thakar and
                  Fareena Saqib},
  title        = {Secure Instruction and Data-Level Information Flow Tracking Model
                  for {RISC-V}},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {58},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040058},
  doi          = {10.3390/CRYPTOGRAPHY7040058},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/NicholasATS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NitajR23,
  author       = {Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Applications of Neural Network-Based {AI} in Cryptography},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {39},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030039},
  doi          = {10.3390/CRYPTOGRAPHY7030039},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/NitajR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Office23,
  author       = {Cryptography Editorial Office},
  title        = {Acknowledgment to the Reviewers of Cryptography in 2022},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010003},
  doi          = {10.3390/CRYPTOGRAPHY7010003},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Office23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PapadopoulosW23,
  author       = {Iason Papadopoulos and
                  Jiabo Wang},
  title        = {Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {2},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010002},
  doi          = {10.3390/CRYPTOGRAPHY7010002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PapadopoulosW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ParkKM23,
  author       = {Seonghwan Park and
                  Hyunil Kim and
                  Inkyu Moon},
  title        = {Automated Classical Cipher Emulation Attacks via Unified Unsupervised
                  Generative Adversarial Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {35},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030035},
  doi          = {10.3390/CRYPTOGRAPHY7030035},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/ParkKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ParrillaGCRM23,
  author       = {Luis Parrilla and
                  Antonio Garc{\'{\i}}a and
                  Encarnaci{\'{o}}n Castillo and
                  Juan Antonio L{\'{o}}pez Ramos and
                  Uwe Meyer{-}Baese},
  title        = {Revisiting Multiple Ring Oscillator-Based True Random Generators to
                  Achieve Compact Implementations on FPGAs for Cryptographic Applications},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {26},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020026},
  doi          = {10.3390/CRYPTOGRAPHY7020026},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ParrillaGCRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PereiraTSMSP23,
  author       = {Bruno Miguel Batista Pereira and
                  Jos{\'{e}} Manuel Torres and
                  Pedro Miguel Sobral and
                  Rui S. Moreira and
                  Christophe Pinto de Almeida Soares and
                  Ivo Pereira},
  title        = {Blockchain-Based Electronic Voting: {A} Secure and Transparent Solution},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {27},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020027},
  doi          = {10.3390/CRYPTOGRAPHY7020027},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PereiraTSMSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RameshDSASS23,
  author       = {Raghunandan Ramesh and
                  Radhakrishna Dodmane and
                  Surendra Shetty and
                  Ganesh Aithal and
                  Monalisa Sahu and
                  Aditya Kumar Sahu},
  title        = {A Novel and Secure Fake-Modulus Based Rabin-{\cyrchar\CYRABHDZE} Cryptosystem},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {44},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030044},
  doi          = {10.3390/CRYPTOGRAPHY7030044},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/RameshDSASS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SalaS23,
  author       = {Riccardo Della Sala and
                  Giuseppe Scotti},
  title        = {A Novel {FPGA} Implementation of the {NAND-PUF} with Minimal Resource
                  Usage and High Reliability},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {18},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020018},
  doi          = {10.3390/CRYPTOGRAPHY7020018},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SalaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SchoenmakersS23,
  author       = {Berry Schoenmakers and
                  Toon Segers},
  title        = {Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty
                  Computation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {56},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040056},
  doi          = {10.3390/CRYPTOGRAPHY7040056},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SchoenmakersS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SoroceanuBM23,
  author       = {Tudor A. A. Soroceanu and
                  Nicolas Buchmann and
                  Marian Margraf},
  title        = {On Multiple Encryption for Public-Key Cryptography},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {49},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040049},
  doi          = {10.3390/CRYPTOGRAPHY7040049},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SoroceanuBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Taherdoost23,
  author       = {Hamed Taherdoost},
  title        = {The Role of Blockchain in Medical Data Sharing},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {36},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030036},
  doi          = {10.3390/CRYPTOGRAPHY7030036},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Taherdoost23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TahirQKLA23,
  author       = {Mehwish Tahir and
                  Yuansong Qiao and
                  Nadia Kanwal and
                  Brian Lee and
                  Mamoona Naveed Asghar},
  title        = {Privacy Preserved Video Summarization of Road Traffic Events for IoT
                  Smart Cities},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {7},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010007},
  doi          = {10.3390/CRYPTOGRAPHY7010007},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TahirQKLA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TrivediBKT23,
  author       = {Devharsh Trivedi and
                  Aymen Boudguiga and
                  Nesrine Kaaniche and
                  Nikos Triandopoulos},
  title        = {SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {52},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040052},
  doi          = {10.3390/CRYPTOGRAPHY7040052},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/TrivediBKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/WalskaarTC23,
  author       = {Ivar Walskaar and
                  Minh Christian Tran and
                  Ferhat {\"{O}}zg{\"{u}}r {\c{C}}atak},
  title        = {A Practical Implementation of Medical Privacy-Preserving Federated
                  Learning Using Multi-Key Homomorphic Encryption and Flower Framework},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {48},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040048},
  doi          = {10.3390/CRYPTOGRAPHY7040048},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/WalskaarTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/YuMM23,
  author       = {Mingfei Yu and
                  Dewmini Sudara Marakkalage and
                  Giovanni De Micheli},
  title        = {Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure
                  Computation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {61},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040061},
  doi          = {10.3390/CRYPTOGRAPHY7040061},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/YuMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Zajac23,
  author       = {Pavol Zajac},
  title        = {Algebraic Cryptanalysis with {MRHS} Equations},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {19},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020019},
  doi          = {10.3390/CRYPTOGRAPHY7020019},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Zajac23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZhouZWCZ23,
  author       = {Quan Zhou and
                  Yulong Zheng and
                  Kaijun Wei and
                  Minhui Chen and
                  Zhikang Zeng},
  title        = {A Multi-Party Functional Signatures Scheme for Private Blockchain},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {21},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020021},
  doi          = {10.3390/CRYPTOGRAPHY7020021},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZhouZWCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics