default search action
Cryptography, Volume 6
Volume 6, Number 1, March 2022
- Jongkil Kim, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Intae Kim:
Functional Encryption for Pattern Matching with a Hidden String. 1 - Alfonso B. Labao, Henry N. Adorna:
A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage. 2 - Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. 3 - Byoung S. Ham:
Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness. 4 - Shay Gueron, Edoardo Persichetti, Paolo Santini:
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup. 5 - Jean Belo Klamti, M. Anwar Hasan:
Post-Quantum Two-Party Adaptor Signature Based on Coding Theory. 6 - Acknowledgment to Reviewers of Cryptography in 2021. 7
- Marius Iulian Mihailescu, Stefania Loredana Nita:
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments. 8 - Wenhua Gao, Li Yang, Daode Zhang, Xia Liu:
Quantum Identity-Based Encryption from the Learning with Errors Problem. 9 - Grzegorz Bazydlo, Remigiusz Wisniewski, Kamil Kozdrój:
Trusted and Secure Blockchain-Based Durable Medium Electronic Service. 10 - Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe:
Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on the Internet of Things Devices. 11 - Abdulbast A. Abushgra:
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review. 12 - Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum:
On the IND-CCA1 Security of FHE Schemes. 13
Volume 6, Number 2, June 2022
- Timothy Dee, Ian Richardson, Akhilesh Tyagi:
Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication. 14 - Brian Goncalves, Atefeh Mashatan:
Tightly Secure PKE Combiner in the Quantum Random Oracle Model. 15 - Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang, Tao Yuan:
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices. 16 - Antonios Patergianakis, Konstantinos Limniotis:
Privacy Issues in Stylometric Methods. 17 - Keerthi Nelaturu, Han Du, Duc-Phong Le:
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions. 18 - Ezinam Bertrand Talaki, Olivier Savry, Mathieu Bouvier Des Noes, David Hély:
A Memory Hierarchy Protected against Side-Channel Attacks. 19 - Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Certificate Management Scheme for VANETs Using Blockchain Structure. 20 - Sara D. Cardell, Verónica Requena, Amparo Fúster-Sabater:
Computational Analysis of Interleaving PN-Sequences with Different Polynomials. 21 - Abhrajit Sengupta, Mohammed Nabeel, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu:
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL. 22 - Linir Zamir, Mehrdad Nojoumian:
Localized State-Change Consensus in Immense and Highly Dynamic Environments. 23 - Mohammad Almseidin, Mouhammd Alkasassbeh, Maen Alzubi, Jamil Al-Sawwa:
Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation. 24 - Binh Kieu-Do-Nguyen, Cuong Pham-Quoc, Ngoc-Thinh Tran, Cong-Kha Pham, Trong-Thuc Hoang:
Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA. 25 - Alessandro Barenghi, Gioele Falcetti, Gerardo Pelosi:
Locating Side Channel Leakage in Time through Matched Filters. 26 - Bartosz Drzazga, Lukasz Krzywiecki:
Review of Chosen Isogeny-Based Cryptographic Schemes. 27 - Dina Ibrahim, Kareem Ahmed, Mohamed Abdallah, Abdelmgeid A. Ali:
A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix. 28 - Damiano Azzolini, Fabrizio Riguzzi:
Probabilistic Logic Models for the Lightning Network. 29 - Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, Trong-Thuc Hoang:
ChaCha20-Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3. 30
Volume 6, Number 3, September 2022
- Anca Radulescu, Marios O. Choudary:
Side-Channel Attacks on Masked Bitsliced Implementations of AES. 31 - Riccardo Longo, Carla Mascia, Alessio Meneghetti, Giordano Santilli, Giovanni Tognolini:
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts. 32 - Abigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou:
A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things. 33 - Febrianti Wibawa, Ferhat Özgür Çatak, Salih Sarp, Murat Kuzlu:
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models. 34 - Yao Zeng, Yuxi Tang, Luping Xiang:
Physical Layer Security Design for Polar Code Construction. 35 - Brit Riggs, Michael Partridge, Bertrand Cambou, Ian Burke, Manuel Aguilar Rios, Julie Heynssens, Dina Ghanaimiandoab:
Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function. 36 - Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad, Abdul Razaque:
Light Weight Authentication Scheme for Smart Home IoT Devices. 37 - Donald E. Owen, Jithin Joseph, Jim Plusquellic, Tom J. Mannos, Brian Dziki:
Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor. 38 - Aritra Banerjee, Hitesh Tewari:
Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant. 39 - Zulianie Binti Jemihin, Soo Fun Tan, Gwo Chin Chung:
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey. 40 - Görkem Nisanci, Paul G. Flikkema, Tolga Yalçin:
Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms. 41 - Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem. 42 - Rajesh Datta, Guangwei Zhao, Kanad Basu, Kaveh Shamsi:
A Security Analysis of Circuit Clock Obfuscation. 43 - Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, Herman Fesenko, Oleg Illiashenko:
Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems. 44 - Kyriaki Tsantikidou, Nicolas Sklavos:
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare. 45 - Katarzyna Koptyra, Marek R. Ogiela:
Subliminal Channels in Visual Cryptography. 46 - Faiza Hashim, Khaled Shuaib, Farag M. Sallabi:
Connected Blockchain Federations for Sharing Electronic Health Records. 47
Volume 6, Number 4, December 2022
- Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer:
Post Quantum Design in SPDM for Device Authentication and Key Establishment. 48 - Chia-Hui Wang, Chih-Hao Hsu:
Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market. 49 - Alfonso B. Labao, Henry N. Adorna:
Cryptographic Rational Secret Sharing Schemes over General Networks. 50 - Macarena C. Martínez-Rodríguez, Luis F. Rojas-Muñoz, Eros Camacho-Ruiz, Santiago Sánchez-Solano, Piedad Brox:
Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems. 51 - Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré:
ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol. 52 - Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos D. Zaroliagis:
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations. 53 - Thijs Veugen, Bart Kamphorst, Michiel Marcus:
Privacy-Preserving Contrastive Explanations with Local Foil Trees. 54 - Carlisle Adams:
Improving User Privacy in Identity-Based Encryption Environments. 55 - Harshana Bandara, Yasitha Herath, Thushara Weerasundara, Janaka Alawatugoda:
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations. 56 - Alexander Kudzin, Kentaroh Toyoda, Satoshi Takayama, Atsushi Ishigame:
Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures. 57 - Mario Ciampi, Diego Romano, Giovanni Schmid:
Process Authentication through Blockchain: Three Case Studies. 58 - Jim Plusquellic:
Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA. 59 - Guangwei Zhao, Kaveh Shamsi:
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation. 60 - Tao Feng, Jiewen Si:
Certificateless Searchable Encryption Scheme in Multi-User Environment. 61 - Sneha Chauhan, Sugata Gangopadhyay, Aditi Kar Gangopadhyay:
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio. 62 - Anant Sujatanagarjuna, Arne Bochem, Benjamin Leiding:
Formalizing and Safeguarding Blockchain-Based BlockVoke Protocol as an ACME Extension for Fast Certificate Revocation. 63 - Quan Zhou, Zhikang Zeng, Kemeng Wang, Menglong Chen:
Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection. 64 - Frederick Stock, Yesem Kurt Peker, Alfredo J. Perez, Jarel Hearst:
Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things. 65
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.