Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptography/cryptography8.bht:"
@article{DBLP:journals/cryptography/BaigEY24, author = {Ahmed Fraz Baig and Sigurd Eskeland and Bian Yang}, title = {Novel and Efficient Privacy-Preserving Continuous Authentication}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {3}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010003}, doi = {10.3390/CRYPTOGRAPHY8010003}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BaigEY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BeheraR24, author = {Sagarika Behera and Prathuri Jhansi Rani}, title = {FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {8}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010008}, doi = {10.3390/CRYPTOGRAPHY8010008}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BeheraR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChenYLXCL24, author = {Chang Chen and Guoyu Yang and Zhihao Li and Fuan Xiao and Qi Chen and Jin Li}, title = {Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {6}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010006}, doi = {10.3390/CRYPTOGRAPHY8010006}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ChenYLXCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JiangBSGPZZL24, author = {Yinhao Jiang and Mir Ali Rezazadeh Baee and Leonie Ruth Simpson and Praveen Gauravaram and Josef Pieprzyk and Tanveer A. Zia and Zhen Zhao and Zung Le}, title = {Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {5}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010005}, doi = {10.3390/CRYPTOGRAPHY8010005}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KabilAA24, author = {Ahmad Kabil and Heba Aslan and Marianne Azer}, title = {Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {4}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010004}, doi = {10.3390/CRYPTOGRAPHY8010004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KabilAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NingCSC24, author = {Yan{-}Duan Ning and Yan{-}Haw Chen and Cheng{-}Sin Shih and Shao{-}I Chu}, title = {Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {11}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010011}, doi = {10.3390/CRYPTOGRAPHY8010011}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NingCSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SebeS24, author = {Francesc Seb{\'{e}} and Sergi Sim{\'{o}}n}, title = {E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {10}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010010}, doi = {10.3390/CRYPTOGRAPHY8010010}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SebeS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SelvamT24, author = {Ravikumar Selvam and Akhilesh Tyagi}, title = {Residue Number System {(RNS)} and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {1}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010001}, doi = {10.3390/CRYPTOGRAPHY8010001}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SelvamT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TsantikidouS24, author = {Kyriaki Tsantikidou and Nicolas Sklavos}, title = {Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {7}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010007}, doi = {10.3390/CRYPTOGRAPHY8010007}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TsantikidouS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/UpadhyayaGP24, author = {Devanshi Upadhyaya and Ma{\"{e}}l Gay and Ilia Polian}, title = {Locking-Enabled Security Analysis of Cryptographic Circuits}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {2}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010002}, doi = {10.3390/CRYPTOGRAPHY8010002}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/UpadhyayaGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/UzunerK24, author = {Hakan Uzuner and Elif Bilge Kavun}, title = {{NLU-V:} {A} Family of Instruction Set Extensions for Efficient Symmetric Cryptography on {RISC-V}}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {9}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010009}, doi = {10.3390/CRYPTOGRAPHY8010009}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/UzunerK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.