![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Cryptography, Volume 6
Volume 6, Number 1, March 2022
- Jongkil Kim, Yang-Wai Chow
, Willy Susilo
, Joonsang Baek, Intae Kim
:
Functional Encryption for Pattern Matching with a Hidden String. 1 - Alfonso B. Labao
, Henry N. Adorna
:
A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage. 2 - Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. 3 - Byoung S. Ham
:
Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness. 4 - Shay Gueron, Edoardo Persichetti
, Paolo Santini:
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup. 5 - Jean Belo Klamti
, M. Anwar Hasan
:
Post-Quantum Two-Party Adaptor Signature Based on Coding Theory. 6 - Acknowledgment to Reviewers of Cryptography in 2021. 7
- Marius Iulian Mihailescu
, Stefania Loredana Nita:
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments. 8 - Wenhua Gao
, Li Yang
, Daode Zhang, Xia Liu:
Quantum Identity-Based Encryption from the Learning with Errors Problem. 9 - Grzegorz Bazydlo
, Remigiusz Wisniewski
, Kamil Kozdrój
:
Trusted and Secure Blockchain-Based Durable Medium Electronic Service. 10 - Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe
:
Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on the Internet of Things Devices. 11 - Abdulbast A. Abushgra
:
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review. 12 - Prastudy Fauzi
, Martha Norberg Hovd
, Håvard Raddum
:
On the IND-CCA1 Security of FHE Schemes. 13
Volume 6, Number 2, June 2022
- Timothy Dee, Ian Richardson, Akhilesh Tyagi:
Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication. 14 - Brian Goncalves
, Atefeh Mashatan
:
Tightly Secure PKE Combiner in the Quantum Random Oracle Model. 15 - Haogang Feng, Gaoze Mu, Shida Zhong
, Peichang Zhang, Tao Yuan:
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices. 16 - Antonios Patergianakis
, Konstantinos Limniotis
:
Privacy Issues in Stylometric Methods. 17 - Keerthi Nelaturu
, Han Du, Duc-Phong Le
:
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions. 18 - Ezinam Bertrand Talaki, Olivier Savry, Mathieu Bouvier Des Noes, David Hély
:
A Memory Hierarchy Protected against Side-Channel Attacks. 19 - Maharage Nisansala Sevwandi Perera
, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Certificate Management Scheme for VANETs Using Blockchain Structure. 20 - Sara D. Cardell
, Verónica Requena
, Amparo Fúster-Sabater
:
Computational Analysis of Interleaving PN-Sequences with Different Polynomials. 21 - Abhrajit Sengupta, Mohammed Nabeel, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu:
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL. 22 - Linir Zamir
, Mehrdad Nojoumian:
Localized State-Change Consensus in Immense and Highly Dynamic Environments. 23 - Mohammad Almseidin
, Mouhammd Alkasassbeh
, Maen Alzubi
, Jamil Al-Sawwa
:
Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation. 24 - Binh Kieu-Do-Nguyen
, Cuong Pham-Quoc
, Ngoc-Thinh Tran, Cong-Kha Pham
, Trong-Thuc Hoang
:
Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA. 25 - Alessandro Barenghi
, Gioele Falcetti, Gerardo Pelosi
:
Locating Side Channel Leakage in Time through Matched Filters. 26 - Bartosz Drzazga
, Lukasz Krzywiecki
:
Review of Chosen Isogeny-Based Cryptographic Schemes. 27 - Dina Ibrahim, Kareem Ahmed
, Mohamed Abdallah, Abdelmgeid A. Ali:
A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix. 28 - Damiano Azzolini
, Fabrizio Riguzzi
:
Probabilistic Logic Models for the Lightning Network. 29 - Ronaldo Serrano
, Ckristian Duran
, Marco Sarmiento
, Cong-Kha Pham
, Trong-Thuc Hoang
:
ChaCha20-Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3. 30
Volume 6, Number 3, September 2022
- Anca Radulescu, Marios O. Choudary:
Side-Channel Attacks on Masked Bitsliced Implementations of AES. 31 - Riccardo Longo
, Carla Mascia
, Alessio Meneghetti
, Giordano Santilli
, Giovanni Tognolini:
Adaptable Cryptographic Primitives in Blockchains via Smart Contracts. 32 - Abigail Akosua Addobea
, Qianmu Li
, Isaac Amankona Obiri
, Jun Hou
:
A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things. 33 - Febrianti Wibawa, Ferhat Özgür Çatak
, Salih Sarp
, Murat Kuzlu
:
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models. 34 - Yao Zeng, Yuxi Tang, Luping Xiang:
Physical Layer Security Design for Polar Code Construction. 35 - Brit Riggs, Michael Partridge, Bertrand Cambou
, Ian Burke, Manuel Aguilar Rios, Julie Heynssens, Dina Ghanaimiandoab:
Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function. 36 - Vipin Kumar
, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi
, Fathi Amsaad, Abdul Razaque:
Light Weight Authentication Scheme for Smart Home IoT Devices. 37 - Donald E. Owen, Jithin Joseph, Jim Plusquellic
, Tom J. Mannos, Brian Dziki:
Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor. 38 - Aritra Banerjee
, Hitesh Tewari
:
Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant. 39 - Zulianie Binti Jemihin
, Soo Fun Tan
, Gwo Chin Chung
:
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey. 40 - Görkem Nisanci, Paul G. Flikkema, Tolga Yalçin:
Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms. 41 - Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou:
How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem. 42 - Rajesh Datta
, Guangwei Zhao
, Kanad Basu, Kaveh Shamsi:
A Security Analysis of Circuit Clock Obfuscation. 43 - Vyacheslav Kharchenko
, Yuriy Ponochovnyi
, Oleg Ivanchenko, Herman Fesenko, Oleg Illiashenko
:
Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems. 44 - Kyriaki Tsantikidou, Nicolas Sklavos
:
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare. 45 - Katarzyna Koptyra
, Marek R. Ogiela
:
Subliminal Channels in Visual Cryptography. 46 - Faiza Hashim, Khaled Shuaib, Farag M. Sallabi
:
Connected Blockchain Federations for Sharing Electronic Health Records. 47
Volume 6, Number 4, December 2022
- Jiewen Yao
, Krystian Matusiewicz, Vincent Zimmer
:
Post Quantum Design in SPDM for Device Authentication and Key Establishment. 48 - Chia-Hui Wang
, Chih-Hao Hsu:
Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market. 49 - Alfonso B. Labao
, Henry N. Adorna
:
Cryptographic Rational Secret Sharing Schemes over General Networks. 50 - Macarena C. Martínez-Rodríguez
, Luis F. Rojas-Muñoz
, Eros Camacho-Ruiz
, Santiago Sánchez-Solano
, Piedad Brox
:
Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems. 51 - Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré:
ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol. 52 - Vyron Kampourakis
, Efstratios Chatzoglou
, Georgios Kambourakis
, Apostolos Dolmes, Christos D. Zaroliagis
:
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations. 53 - Thijs Veugen
, Bart Kamphorst
, Michiel Marcus
:
Privacy-Preserving Contrastive Explanations with Local Foil Trees. 54 - Carlisle Adams
:
Improving User Privacy in Identity-Based Encryption Environments. 55 - Harshana Bandara
, Yasitha Herath, Thushara Weerasundara, Janaka Alawatugoda
:
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations. 56 - Alexander Kudzin
, Kentaroh Toyoda
, Satoshi Takayama
, Atsushi Ishigame
:
Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures. 57 - Mario Ciampi
, Diego Romano
, Giovanni Schmid
:
Process Authentication through Blockchain: Three Case Studies. 58 - Jim Plusquellic
:
Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA. 59 - Guangwei Zhao
, Kaveh Shamsi:
Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation. 60 - Tao Feng
, Jiewen Si:
Certificateless Searchable Encryption Scheme in Multi-User Environment. 61 - Sneha Chauhan, Sugata Gangopadhyay, Aditi Kar Gangopadhyay:
Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio. 62 - Anant Sujatanagarjuna
, Arne Bochem
, Benjamin Leiding
:
Formalizing and Safeguarding Blockchain-Based BlockVoke Protocol as an ACME Extension for Fast Certificate Revocation. 63 - Quan Zhou, Zhikang Zeng
, Kemeng Wang
, Menglong Chen
:
Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection. 64 - Frederick Stock, Yesem Kurt Peker
, Alfredo J. Perez
, Jarel Hearst:
Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things. 65
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.