Stop the war!
Остановите войну!
for scientists:
default search action
Cryptography, Volume 5
Volume 5, Number 1, March 2021
- Sarah A. Alzakari, Poorvi L. Vora:
Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck. 1 - Tushar Kanti Saha, Takeshi Koshiba:
Efficient Private Conjunctive Query Protocol Over Encrypted Data. 2 - Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden:
On the Possibility of Classical Client Blind Quantum Computing. 3 - Bayan Ibrahimm Alabdullah, Natalia Beloff, Martin White:
E-ART: A New Encryption Algorithm Based on the Reflection of Binary Search Tree. 4 - Acknowledgment to Reviewers of Cryptography in 2020. 5
- Malek Safieh, Jürgen Freudenberger:
Montgomery Reduction for Gaussian Integers. 6 - Holden Gordon, Jack Edmonds, Soroor Ghandali, Wei Yan, Nima Karimian, Fatemeh Tehranipoor:
Flash-Based Security Primitives: Evolution, Challenges and Future Directions. 7 - Bertrand Cambou, Donald Telesca, Sareh Assiri, Michael Garrett, Saloni Jain, Michael Partridge:
TRNGs from Pre-Formed ReRAM Arrays. 8 - Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri, Navid Asadizanjani:
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It? 9 - Niluka Amarasinghe, Xavier Boyen, Matthew McKague:
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration. 10 - Jürgen Freudenberger, Johann-Philipp Thiers:
A New Class of Q-Ary Codes for the McEliece Cryptosystem. 11
Volume 5, Number 2, June 2021
- Yu-Cheng Chen, Vincent John Mooney, Santiago Grijalva:
Grid Cyber-Security Strategy in an Attacker-Defender Model. 12 - Ehsan Aerabi, David Hély, Cyril Bresch, Athanasios Papadimitriou, Mahdi Fazeli:
CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes. 13 - Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila:
Associative Blockchain for Decentralized PKI Transparency. 14 - Jacob T. Grycel, Patrick Schaumont:
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks. 15
Volume 5, Number 3, September 2021
- Davide Bellizia, Riccardo Della Sala, Giuseppe Scotti:
SC-DDPL as a Countermeasure against Static Power Side-Channel Attacks. 16 - Hibiki Ono, Yoshifumi Manabe:
Minimum Round Card-Based Cryptographic Protocols Using Private Operations. 17 - Yutian Gui, Chaitanya Bhure, Marcus Hughes, Fareena Saqib:
A Delay-Based Machine Learning Model for DMA Attack Mitigation. 18 - Minhye Seo:
Fair and Secure Multi-Party Computation with Cheater Detection. 19 - Kabiru Mohammed, Aladdin Ayesh, Eerke A. Boiten:
Complementing Privacy and Utility Trade-Off with Self-Organising Maps. 20 - Andre Ostrak, Jaak Randmets, Ville Sokk, Sven Laur, Liina Kamm:
Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification. 21 - Sven Laur, Pille Pullonen-Raudvere:
Foundations of Programmable Secure Computation. 22 - Riccardo Della Sala, Davide Bellizia, Giuseppe Scotti:
A Novel Ultra-Compact FPGA PUF: The DD-PUF. 23 - Dor Salomon, Amir Weiss, Itamar Levi:
Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis. 24 - Netanel Klein, Eyal Harel, Itamar Levi:
The Cost of a True Random Bit - On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs. 25
Volume 5, Number 4, 2021
- Julian Danner, Martin Kreuzer:
A Fault Attack on the Family of Enocoro Stream Ciphers. 26 - Mohammad Anagreh, Peeter Laud, Eero Vainikko:
Parallel Privacy-Preserving Shortest Path Algorithms. 27 - Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar G. da Costa, Setareh Rafatirad, Houman Homayoun:
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach. 28 - Irene Ioannidou, Nicolas Sklavos:
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications. 29 - Bang Yuan Chong, Iftekhar Salam:
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms. 30 - Alessandro Budroni, Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
Improvements on Making BKW Practical for Solving LWE. 31 - Emad Hamadaqa, Saleh Mulhem, Wael Adi, Mladen Berekovic:
Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies. 32 - Johann-Philipp Thiers, Jürgen Freudenberger:
Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography. 33 - Konstantinos Limniotis:
Cryptography as the Means to Protect Fundamental Human Rights. 34 - K. S. Suvidha, Jothi Rangasamy, Shyam S. Kamath, Cheng-Chi Lee:
ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks. 35 - Diego Romano, Giovanni Schmid:
Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology. 36 - Noha Ezzat El-Attar, Doaa S. El-Morshedy, Wael A. Awad:
A New Hybrid Automated Security Framework to Cloud Storage System. 37 - Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan:
Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions. 38
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.