Login / Signup
Cryptogr.
2017
2020
2024
2017
2024
Keyphrases
Publications
volume 8, number 1, 2024
Chang Chen
,
Guoyu Yang
,
Zhihao Li
,
Fuan Xiao
,
Qi Chen
,
Jin Li
Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols.
Cryptogr.
8 (1) (2024)
Francesc Sebé
,
Sergi Simón
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval.
Cryptogr.
8 (1) (2024)
Ravikumar Selvam
,
Akhilesh Tyagi
Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks.
Cryptogr.
8 (1) (2024)
Hakan Uzuner
,
Elif Bilge Kavun
NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V.
Cryptogr.
8 (1) (2024)
Ahmed Fraz Baig
,
Sigurd Eskeland
,
Bian Yang
Novel and Efficient Privacy-Preserving Continuous Authentication.
Cryptogr.
8 (1) (2024)
Kyriaki Tsantikidou
,
Nicolas Sklavos
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures.
Cryptogr.
8 (1) (2024)
Ahmad Kabil
,
Heba Aslan
,
Marianne Azer
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks.
Cryptogr.
8 (1) (2024)
Devanshi Upadhyaya
,
Maël Gay
,
Ilia Polian
Locking-Enabled Security Analysis of Cryptographic Circuits.
Cryptogr.
8 (1) (2024)
Sagarika Behera
,
Prathuri Jhansi Rani
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data.
Cryptogr.
8 (1) (2024)
Yinhao Jiang
,
Mir Ali Rezazadeh Baee
,
Leonie Ruth Simpson
,
Praveen Gauravaram
,
Josef Pieprzyk
,
Tanveer A. Zia
,
Zhen Zhao
,
Zung Le
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures.
Cryptogr.
8 (1) (2024)
Yan-Duan Ning
,
Yan-Haw Chen
,
Cheng-Sin Shih
,
Shao-I Chu
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography.
Cryptogr.
8 (1) (2024)
volume 8, number 2, 2024
Abdullah Aljuffri
,
Ruoyu Huang
,
Laura Muntenaar
,
Georgi Gaydadjiev
,
Kezheng Ma
,
Said Hamdioui
,
Mottaqiallah Taouil
The Security Evaluation of an Efficient Lightweight AES Accelerator.
Cryptogr.
8 (2) (2024)
Lahraoui Younes
,
Saiida Lazaar
,
Amal Youssef
,
Abderrahmane Nitaj
Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance.
Cryptogr.
8 (2) (2024)
Oleksandr Kuznetsov
,
Nikolay Poluyanenko
,
Emanuele Frontoni
,
Sergey Kandiy
Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.
Cryptogr.
8 (2) (2024)
Gregory Fitzgibbon
,
Carlo Ottaviani
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography.
Cryptogr.
8 (2) (2024)
Ádám Vécsi
,
Attila Pethö
Auditable Anonymous Electronic Examination.
Cryptogr.
8 (2) (2024)
Asma Sifaoui
,
Matthew S. Eastin
"Whispers from the Wrist": Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities.
Cryptogr.
8 (2) (2024)
Peng Zhang
,
Ao Duan
,
Hengrui Lu
An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks.
Cryptogr.
8 (2) (2024)
Idris Somoye
,
Jim Plusquellic
,
Tom J. Mannos
,
Brian Dziki
An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor.
Cryptogr.
8 (2) (2024)
Xiaotong Chen
,
Songlin He
,
Linfu Sun
,
Yangxin Zheng
,
Chase Q. Wu
A Survey of Consortium Blockchain and Its Applications.
Cryptogr.
8 (2) (2024)
Minyan Gao
,
Liton Kumar Biswas
,
Navid Asadi
,
Domenic Forte
Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource.
Cryptogr.
8 (2) (2024)
Maksim Iavich
,
Tamari Kuchukhidze
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation.
Cryptogr.
8 (2) (2024)
Maksymilian Gorski
,
Wojciech Wodo
Analysis of Biometric-Based Cryptographic Key Exchange Protocols - BAKE and BRAKE.
Cryptogr.
8 (2) (2024)
Zahraa Abdullah Ali
,
Zaid Ameen Abduljabbar
,
Hamid Ali Abed Al-Asadi
,
Vincent Omollo Nyangaresi
,
Iman Qays Abduljaleel
,
Abdulla J. Y. Aldarwish
A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids.
Cryptogr.
8 (2) (2024)
Chunlei Li
A Survey on Complexity Measures for Pseudo-Random Sequences.
Cryptogr.
8 (2) (2024)
Gregor Haywood
,
Saleem N. Bhatti
Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths.
Cryptogr.
8 (2) (2024)
volume 7, number 3, 2023
Maher Boudabra
,
Abderrahmane Nitaj
A New RSA Variant Based on Elliptic Curves.
Cryptogr.
7 (3) (2023)
Marco Cesati
A New Idea for RSA Backdoors.
Cryptogr.
7 (3) (2023)
Aleksei D. Kodukhov
,
Valeria A. Pastushenko
,
Nikita S. Kirsanov
,
Dmitry A. Kronberg
,
Markus Pflitsch
,
Valerii M. Vinokur
Boosting Quantum Key Distribution via the End-to-End Loss Control.
Cryptogr.
7 (3) (2023)
Seonghwan Park
,
Hyunil Kim
,
Inkyu Moon
Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks.
Cryptogr.
7 (3) (2023)
Stan Korzilius
,
Berry Schoenmakers
Divisions and Square Roots with Tight Error Analysis from Newton-Raphson Iteration in Secure Fixed-Point Arithmetic.
Cryptogr.
7 (3) (2023)
volume 7, number 4, 2023
Anastasios N. Bikos
,
Panagiotis E. Nastou
,
Georgios Petroudis
,
Yannis C. Stamatiou
Random Number Generators: Principles and Applications.
Cryptogr.
7 (4) (2023)
Ivar Walskaar
,
Minh Christian Tran
,
Ferhat Özgür Çatak
A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework.
Cryptogr.
7 (4) (2023)
Berry Schoenmakers
,
Toon Segers
Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation.
Cryptogr.
7 (4) (2023)
Xian Guo
,
Ye Li
,
Yongbo Jiang
,
Jing Wang
,
Junli Fang
Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments.
Cryptogr.
7 (4) (2023)
Eufemia Lella
,
Giovanni Schmid
On the Security of Quantum Key Distribution Networks.
Cryptogr.
7 (4) (2023)
Devharsh Trivedi
,
Aymen Boudguiga
,
Nesrine Kaaniche
,
Nikos Triandopoulos
SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation.
Cryptogr.
7 (4) (2023)
Tudor A. A. Soroceanu
,
Nicolas Buchmann
,
Marian Margraf
On Multiple Encryption for Public-Key Cryptography.
Cryptogr.
7 (4) (2023)
Yamin Li
Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms.
Cryptogr.
7 (4) (2023)
Hwai-Tsu Hu
,
Tung-Tsun Lee
Hiding Full-Color Images into Audio with Visual Enhancement via Residual Networks.
Cryptogr.
7 (4) (2023)
Cheng-Chi Lee
,
Mehdi Gheisari
,
Mohammad Javad Shayegan
,
Milad Taleby Ahvanooey
,
Yang Liu
Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
Cryptogr.
7 (4) (2023)
Trong-Hung Nguyen
,
Cong-Kha Pham
,
Trong-Thuc Hoang
A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography.
Cryptogr.
7 (4) (2023)
Li Duan
,
Yong Li
,
Lijun Liao
Practical Certificate-Less Infrastructure with Application in TLS.
Cryptogr.
7 (4) (2023)
Jinhui Liu
,
Tianyi Han
,
Maolin Tan
,
Bo Tang
,
Wei Hu
,
Yong Yu
A Publicly Verifiable E-Voting System Based on Biometrics.
Cryptogr.
7 (4) (2023)
Mingfei Yu
,
Dewmini Sudara Marakkalage
,
Giovanni De Micheli
Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation.
Cryptogr.
7 (4) (2023)
Luis Adrián Lizama-Pérez
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era.
Cryptogr.
7 (4) (2023)
Alessandra Dolmeta
,
Maurizio Martina
,
Guido Masera
Comparative Study of Keccak SHA-3 Implementations.
Cryptogr.
7 (4) (2023)
Kusum Lata
,
Linga Reddy Cenkeramaddi
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis.
Cryptogr.
7 (4) (2023)
Geraldine Shirley Nicholas
,
Dhruvakumar Vikas Aklekar
,
Bhavin Thakar
,
Fareena Saqib
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V.
Cryptogr.
7 (4) (2023)
Theodore Andronikos
,
Alla Sirokofskich
One-to-Many Simultaneous Secure Quantum Information Transmission.
Cryptogr.
7 (4) (2023)