default search action
Cryptography, Volume 4
Volume 4, Number 1, March 2020
- Emad Hamadaqa, Ayoub Mars, Wael Adi:
Physical Security for Fleet Management Systems. 1 - Alexander Sauer, Gernot Alber:
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming. 2 - Damian Markham, Alexandra Krause:
A Simple Protocol for Certifying Graph States and Applications in Quantum Networks. 3 - Acknowledgement to Reviewers of Cryptography in 2019. 4
- Eric Järpe:
An Alternative Diffie-Hellman Protocol. 5 - Saleh Mulhem, Ayoub Mars, Wael Adi:
Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities. 6 - Luca Mazzarella, Christopher John Lowe, David Lowndes, Siddarth Koduru Joshi, Steve Greenland, Doug McNeil, Cassandra Mercury, Malcolm Macdonald, John G. Rarity, Daniel Kuan Li Oi:
QUARC: Quantum Research Cubesat - A Constellation for Quantum Communication. 7 - Md Jubayer al Mahmod, Ujjwal Guin:
A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications. 8 - Reham Almukhlifi, Poorvi L. Vora:
Linear Cryptanalysis of Reduced-Round Simon Using Super Rounds. 9 - Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba:
On Quantum Chosen-Ciphertext Attacks and Learning with Errors. 10
Volume 4, Number 2, June 2020
- Mitchell T. Martin, Jim Plusquellic:
NotchPUF: Printed Circuit Board PUF Based on Microstrip Notch Filter. 11 - Robert Cockell, Basel Halak:
On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics. 12 - Ivan Bow, Nahome Bete, Fareena Saqib, Wenjie Che, Chintan Patel, Ryan W. Robucci, Calvin Chan, Jim Plusquellic:
Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity. 13 - Aysajan Abidin:
On Detecting Relay Attacks on RFID Systems Using Qubits. 14 - Mark Randolph, William Diehl:
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman. 15 - Maki Kihara, Satoshi Iriyama:
Security and Performance of Single Sign-on Based on One-Time Pad Algorithm. 16 - Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Robert Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca, Laurent Njilla:
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions. 17 - Mohammed Abu Taha, Wassim Hamidouche, Naty Sidaty, Marko Viitanen, Jarno Vanne, Safwan El Assad, Olivier Déforges:
Privacy Protection in Real Time HEVC Standard Using Chaotic System. 18
Volume 4, Number 3, September 2020
- Mayssa Tayachi, Saleh Mulhem, Wael Adi, Laurent Nana, Anca Pascu, Faouzi Benzarti:
Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems. 19 - Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong:
Optimized CSIDH Implementation Using a 2-Torsion Point. 20 - Koki Jimbo, Satoshi Iriyama, Massimo Regoli:
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization. 21 - Ashutosh Dhar Dwivedi:
Security Analysis of Lightweight IoT Cipher: Chaskey. 22 - Takeshi Sugawara:
Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation. 23 - Noah Cowper, Harry C. Shaw, David R. Thayer:
Chaotic Quantum Key Distribution. 24 - Georgia Tsaloli, Gustavo Banegas, Aikaterini Mitrokotsa:
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing. 25
Volume 4, Number 4, December 2020
- Ali Shuja Siddiqui, Yutian Gui, Fareena Saqib:
Secure Boot for Reconfigurable Architectures. 26 - Sylvain Guilley, Khaled Karray, Thomas Perianin, Ritu Ranjan Shrivastwa, Youssef Souissi, Sofiane Takarabt:
Side-Channel Evaluation Methodology on Software. 27 - Yunhong Zhou, Shihui Zheng, Licheng Wang:
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud. 28 - Bharath K. Samanthula, Divya Karthikeyan, Boxiang Dong, K. Anitha Kumari:
ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services. 29 - Debayan Das, Shreyas Sen:
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach. 30 - Georgios M. Nikolopoulos, Marc Fischlin:
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources. 31 - Jeff Nijsse, Alan T. Litchfield:
A Taxonomy of Blockchain Consensus Methods. 32 - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation. 33 - Sergey Bezzateev, Vadim Davydov, Aleksandr Ometov:
On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication. 34 - Oleg Evsutin, Kristina Dzhanashia:
Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security. 35 - Rinat Breuer, Itamar Levi:
How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security Evaluation and its Cost. 36 - Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa:
Statically Aggregate Verifiable Random Functions and Application to E-Lottery. 37
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.