Search dblp for Publications

export results for "toc:db/journals/cryptography/cryptography8.bht:"

 download as .bib file

@article{DBLP:journals/cryptography/BaigEY24,
  author       = {Ahmed Fraz Baig and
                  Sigurd Eskeland and
                  Bian Yang},
  title        = {Novel and Efficient Privacy-Preserving Continuous Authentication},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {3},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010003},
  doi          = {10.3390/CRYPTOGRAPHY8010003},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BaigEY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BeheraR24,
  author       = {Sagarika Behera and
                  Prathuri Jhansi Rani},
  title        = {FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic
                  Encrypted Data},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {8},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010008},
  doi          = {10.3390/CRYPTOGRAPHY8010008},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BeheraR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChenYLXCL24,
  author       = {Chang Chen and
                  Guoyu Yang and
                  Zhihao Li and
                  Fuan Xiao and
                  Qi Chen and
                  Jin Li},
  title        = {Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {6},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010006},
  doi          = {10.3390/CRYPTOGRAPHY8010006},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChenYLXCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JiangBSGPZZL24,
  author       = {Yinhao Jiang and
                  Mir Ali Rezazadeh Baee and
                  Leonie Ruth Simpson and
                  Praveen Gauravaram and
                  Josef Pieprzyk and
                  Tanveer A. Zia and
                  Zhen Zhao and
                  Zung Le},
  title        = {Pervasive User Data Collection from Cyberspace: Privacy Concerns and
                  Countermeasures},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {5},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010005},
  doi          = {10.3390/CRYPTOGRAPHY8010005},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KabilAA24,
  author       = {Ahmad Kabil and
                  Heba Aslan and
                  Marianne Azer},
  title        = {Cryptanalysis of Two Conditional Privacy Preserving Authentication
                  Schemes for Vehicular Ad Hoc Networks},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {4},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010004},
  doi          = {10.3390/CRYPTOGRAPHY8010004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KabilAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NingCSC24,
  author       = {Yan{-}Duan Ning and
                  Yan{-}Haw Chen and
                  Cheng{-}Sin Shih and
                  Shao{-}I Chu},
  title        = {Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve
                  Cryptography},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {11},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010011},
  doi          = {10.3390/CRYPTOGRAPHY8010011},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NingCSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SebeS24,
  author       = {Francesc Seb{\'{e}} and
                  Sergi Sim{\'{o}}n},
  title        = {E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {10},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010010},
  doi          = {10.3390/CRYPTOGRAPHY8010010},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SebeS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SelvamT24,
  author       = {Ravikumar Selvam and
                  Akhilesh Tyagi},
  title        = {Residue Number System {(RNS)} and Power Distribution Network Topology-Based
                  Mitigation of Power Side-Channel Attacks},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {1},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010001},
  doi          = {10.3390/CRYPTOGRAPHY8010001},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SelvamT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TsantikidouS24,
  author       = {Kyriaki Tsantikidou and
                  Nicolas Sklavos},
  title        = {Threats, Attacks, and Cryptography Frameworks of Cybersecurity in
                  Critical Infrastructures},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {7},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010007},
  doi          = {10.3390/CRYPTOGRAPHY8010007},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TsantikidouS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/UpadhyayaGP24,
  author       = {Devanshi Upadhyaya and
                  Ma{\"{e}}l Gay and
                  Ilia Polian},
  title        = {Locking-Enabled Security Analysis of Cryptographic Circuits},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {2},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010002},
  doi          = {10.3390/CRYPTOGRAPHY8010002},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/UpadhyayaGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/UzunerK24,
  author       = {Hakan Uzuner and
                  Elif Bilge Kavun},
  title        = {{NLU-V:} {A} Family of Instruction Set Extensions for Efficient Symmetric
                  Cryptography on {RISC-V}},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {9},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010009},
  doi          = {10.3390/CRYPTOGRAPHY8010009},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/UzunerK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics