default search action
Cryptography, Volume 1
Volume 1, Number 1, June 2017
- Kwangjo Kim:
Cryptography: A New Open Access Journal. 1 - Shoni Gilboa, Shay Gueron, Mridul Nandi:
Balanced Permutations Even-Mansour Ciphers. 2 - Wenjie Che, Mitchell T. Martin, Goutham Pocklassery, Venkata K. Kajuluri, Fareena Saqib, Jim Plusquellic:
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol. 3 - Daniel G. Costa, José Solenir Lima Figuerêdo, Gledson Oliveira:
Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions. 4 - Nicolas Sklavos:
Privacy in a Digital, Networked World: Technologies, Implications and Solutions. By Sherali Zeadally and Mohamad Badra. Springer International Publishing: 418 pp.; $51.89; ISBN-10: 3319084690, ISBN-13: 978-3319084695. 5 - Elham Kashefi, Petros Wallden:
Garbled Quantum Computation. 6 - Leyla Isik, Arne Winterhof:
Maximum-Order Complexity and Correlation Measures. 7 - Wenjie Che, Venkata K. Kajuluri, Mitchell T. Martin, Fareena Saqib, Jim Plusquellic:
Analysis of Entropy in a Hardware-Embedded Delay PUF. 8 - Swapnoneel Roy, Chanchal Khatwani:
Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols. 9
Volume 1, Number 2, September 2017
- George Hatzivasilis:
Password-Hashing Status. 10 - Jamie Sikora:
Simple, Near-Optimal Quantum Protocols for Die-Rolling. 11 - Elham Kashefi, Anna Pappa:
Multiparty Delegated Quantum Computing. 12 - Xukai Zou, Huian Li, Feng Li, Wei Peng, Yan Sui:
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election. 13 - Rémi Bricout, André Chailloux:
Recursive Cheating Strategies for the Relativistic FQ Bit Commitment Protocol. 14 - Diego Romano, Giovanni Schmid:
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems. 15
Volume 1, Number 3, December 2017
- Florentin Thullier, Bruno Bouchard, Bob-Antoine Jerry Ménélas:
A Text-Independent Speaker Authentication System for Mobile Devices. 16 - Wenjie Che, Venkata K. Kajuluri, Fareena Saqib, Jim Plusquellic:
Leveraging Distributions in Physical Unclonable Functions. 17 - Anton Pljonkin, Konstantin E. Rumyantsev, Pradeep Kumar Singh:
Synchronization in Quantum Key Distribution Systems. 18 - Sarah Louise Renwick, Keith M. Martin:
Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment. 19 - Tom Eccles, Basel Halak:
Performance Analysis of Secure and Private Billing Protocols for Smart Metering. 20 - Harry C. Shaw:
A Cryptographic System Based upon the Principles of Gene Expression. 21 - George S. Eskander Ekladious, Robert Sabourin, Eric Granger:
Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems. 22 - Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk:
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise. 23 - Hae-Duck J. Jeong, WonHwi Ahn, Hyeonggeun Kim, Jong-Suk Ruth Lee:
Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim. 24 - Anunay Kulshrestha, Akshay Rampuria, Matthew Denton, Ashwin Sreenivas:
Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption. 25
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.