![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Cryptography, Volume 2
Volume 2, Number 1, March 2018
- Aleksandr Ometov
, Sergey Bezzateev
, Niko Mäkitalo
, Sergey Andreev
, Tommi Mikkonen
, Yevgeni Koucheryavy
:
Multi-Factor Authentication: A Survey. 1 - Dimitrios Alvanos, Konstantinos Limniotis
, Stavros Stavrou:
On the Cryptographic Features of a VoIP Service. 3 - Md. Iftekhar Salam
, Leonie Simpson
, Harry Bartlett
, Ed Dawson
, Kenneth Koon-Ho Wong
:
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. 4 - Jani Suomalainen
, Adrian Kotelba
, Jari Kreku, Sami Lehtonen
:
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT. 5 - Bertrand Cambou, Paul G. Flikkema, James Palmer, Donald Telesca, Christopher Robert Philabaum:
Can Ternary Computing Improve Information Assurance? 6
Volume 2, Number 2, June 2018
- Nikolaos Athanasios Anagnostopoulos
, Stefan Katzenbeisser, John A. Chandy
, Fatemeh Tehranipoor
:
An Overview of DRAM-Based Security Primitives. 7 - Sebastian Baur, Holger Boche:
Robust Secure Authentication and Data Storage with Perfect Secrecy. 8 - Filipe Casal, João Rasga
, André Souto
:
Kolmogorov One-Way Functions Revisited. 9 - Alan T. Litchfield
, Jeff Herbert:
ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation. 10 - Shoichi Hirose:
Sequential Hashing with Minimum Padding. 11
Volume 2, Number 3, September 2018
- Michel A. Kinsy
, Lake Bu
, Mihailo Isakov, Miguel Mark:
Designing Secure Heterogeneous Multicore Systems from Untrusted Components. 12 - Nikolaos Athanasios Anagnostopoulos
, Tolga Arul
, Yufan Fan
, Christian Hatzfeld
, André Schaller
, Wenjie Xiong
, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer
, Jakub Szefer
, Stefan Katzenbeisser:
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †. 13 - Balaji Chandrasekaran
, Ramadoss Balakrishnan:
An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments. 14 - Don Owen Jr., Derek Heeger, Calvin Chan, Wenjie Che
, Fareena Saqib, Matthew Areno, Jim Plusquellic
:
An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays. 15 - María Isabel González Vasco, Angela Robinson, Rainer Steinwandt:
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn. 16 - Sadman Sakib
, Preeti Kumari
, Bashir M. Sabquat Bahar Talukder, Md. Tauhidur Rahman
, Biswajit Ray:
Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics †. 17 - Juha Partala
:
Provably Secure Covert Communication on Blockchain. 18 - Andreas Vogt:
Special Issue on Cryptographic Protocols. 19 - Taimour Wehbe
, Vincent John Mooney III, David C. Keezer:
Hardware-Based Run-Time Code Integrity in Embedded Devices. 20 - Jim Plusquellic
, Matthew Areno:
Correlation-Based Robust Authentication (Cobra) Using Helper Data Only. 21 - Yunxi Guo
, Timothy Dee, Akhilesh Tyagi
:
Barrel Shifter Physical Unclonable Function Based Encryption. 22 - Sadiel de la Fe
, Carles Ferrer:
A Secure Algorithm for Inversion Modulo 2k. 23 - Joy Jo-Yi Chang, Bo-Yuan Huang, Justie Su-tzu Juan
:
A New Visual Multi-Secrets Sharing Scheme by Random Grids. 24 - Jean-Luc Danger, Youssef El Housni
, Adrien Facon, Cheikh Thiecoumba Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti
, Alexander Schaub:
On the Performance and Security of Multiplication in GF(2N). 25 - William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj:
Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers. 26
Volume 2, Number 4, December 2018
- Rami Sheikh, Rosario Cammarota
:
Improving Performance and Mitigating Fault Attacks Using Value Prediction. 27 - Ying-Yu Chen, Bo-Yuan Huang, Justie Su-tzu Juan
:
A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion. 28 - Salome James, N. B. Gayathri, Punugu Vasudeva Reddy
:
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery. 29 - Edoardo Persichetti
:
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment. 30 - Ted Krovetz
:
The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF. 31 - Terry Shue Chien Lau
, Chik How Tan:
A New Technique in Rank Metric Code-Based Encryption. 32 - Ziyuan Hu
, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption. 33 - Jialuo Han
, Jidong Wang
:
An Enhanced Key Management Scheme for LoRaWAN. 34 - Xavier Boyen, Thomas Haines:
Forward-Secure Linkable Ring Signatures from Bilinear Maps. 35 - Pratha Anuradha Kameswari, Lambadi Jyotsna:
An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques. 36 - Megha Agrawal, Donghoon Chang, Jinkeon Kang
:
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices. 37 - James Jin Kang
, Kiran Fahd, Sitalakshmi Venkatraman
:
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity. 38 - Stefania Loredana Nita
, Marius Iulian Mihailescu
, Valentin Corneliu Pau:
Security and Cryptographic Challenges for Authentication Based on Biometrics Data. 39 - Filippo Gandino
, Bartolomeo Montrucchio
, Maurizio Rebaudengo
:
Redundancy in Key Management for WSNs. 40 - Christian Frøystad
, Inger Anne Tøndel
, Martin Gilje Jaatun
:
Security Incident Information Exchange for Cloud Service Provisioning Chains. 41 - Jonathan T. Trostle:
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion. 42
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.