Stop the war!
Остановите войну!
for scientists:
default search action
Cryptography, Volume 8
Volume 8, Number 1, March 2024
- Ravikumar Selvam, Akhilesh Tyagi:
Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks. 1 - Devanshi Upadhyaya, Maël Gay, Ilia Polian:
Locking-Enabled Security Analysis of Cryptographic Circuits. 2 - Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang:
Novel and Efficient Privacy-Preserving Continuous Authentication. 3 - Ahmad Kabil, Heba Aslan, Marianne Azer:
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. 4 - Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao, Zung Le:
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. 5 - Chang Chen, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, Jin Li:
Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols. 6 - Kyriaki Tsantikidou, Nicolas Sklavos:
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures. 7 - Sagarika Behera, Prathuri Jhansi Rani:
FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data. 8 - Hakan Uzuner, Elif Bilge Kavun:
NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V. 9 - Francesc Sebé, Sergi Simón:
E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval. 10 - Yan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu:
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography. 11
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.