default search action
Cryptography, Volume 8
Volume 8, Number 1, March 2024
- Ravikumar Selvam, Akhilesh Tyagi:
Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks. 1 - Devanshi Upadhyaya, Maël Gay, Ilia Polian:
Locking-Enabled Security Analysis of Cryptographic Circuits. 2 - Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang:
Novel and Efficient Privacy-Preserving Continuous Authentication. 3 - Ahmad Kabil, Heba Aslan, Marianne Azer:
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. 4 - Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao, Zung Le:
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. 5 - Chang Chen, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, Jin Li:
Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols. 6 - Kyriaki Tsantikidou, Nicolas Sklavos:
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures. 7 - Sagarika Behera, Prathuri Jhansi Rani:
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data. 8 - Hakan Uzuner, Elif Bilge Kavun:
NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V. 9 - Francesc Sebé, Sergi Simón:
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval. 10 - Yan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu:
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography. 11
Volume 8, Number 2, June 2024
- Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng, Chase Q. Wu:
A Survey of Consortium Blockchain and Its Applications. 12 - Minyan Gao, Liton Kumar Biswas, Navid Asadi, Domenic Forte:
Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource. 13 - Maksymilian Gorski, Wojciech Wodo:
Analysis of Biometric-Based Cryptographic Key Exchange Protocols - BAKE and BRAKE. 14 - Maksim Iavich, Tamari Kuchukhidze:
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation. 15 - Idris Somoye, Jim Plusquellic, Tom J. Mannos, Brian Dziki:
An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor. 16 - Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy:
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography. 17 - Peng Zhang, Ao Duan, Hengrui Lu:
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks. 18 - Ádám Vécsi, Attila Pethö:
Auditable Anonymous Electronic Examination. 19 - Zahraa Abdullah Ali, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish:
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids. 20 - Gregory Fitzgibbon, Carlo Ottaviani:
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography. 21 - Gregor Haywood, Saleem N. Bhatti:
Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths. 22 - Lahraoui Younes, Saiida Lazaar, Amal Youssef, Abderrahmane Nitaj:
Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance. 23 - Abdullah Aljuffri, Ruoyu Huang, Laura Muntenaar, Georgi Gaydadjiev, Kezheng Ma, Said Hamdioui, Mottaqiallah Taouil:
The Security Evaluation of an Efficient Lightweight AES Accelerator. 24 - Chunlei Li:
A Survey on Complexity Measures for Pseudo-Random Sequences. 25 - Asma Sifaoui, Matthew S. Eastin:
"Whispers from the Wrist": Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities. 26
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.