


default search action
Cryptography, Volume 10
Volume 10, Number 1, 2025
- Yijia Dai, Yitong Li

, Ye Yuan, Xianwei Gao, Cong Bian, Meici Liu:
DLR-Auth: A Decentralized Lightweight and Revocable Authentication Framework for the Industrial Internet of Things. 1 - Zhaoxiong Meng

, Rukui Zhang, Bin Cao, Meng Zhang, Yajun Li, Huhu Xue, Meimei Yang:
AI-Enhanced Perceptual Hashing with Blockchain for Secure and Transparent Digital Copyright Management. 2 - Xinyao Li

, Akhilesh Tyagi
:
Large Pages, Large Leaks? Hugepage-Induced Side-Channels vs. Performance Improvements in Cryptographic Computations. 3 - Bashar Suhail Khassawneh

, Issa Al-Aiash, Mahmoud AlJamal
, Omar Aljamal, Latifa Abdullah Almusfar
, Bashair Faisal Althani
, Waad Aldossary:
Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization. 4 - Tongchen Shen, Xiangxue Li, Licheng Wang:

Lower Bound on the Overlattice-Based Sieve Algorithm. 5 - Asmaa Kassimi

, Abdullah Aljuffri
, Christian Larmann
, Said Hamdioui
, Mottaqiallah Taouil
:
Secure Implementation of RISC-V's Scalar Cryptography Extension Set. 6 - Daniel Alarcón-Narváez, Luis Adrián Lizama-Pérez

, Fausto Abraham Jacques-García
:
Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge-Response Authentication. 7 - Adrian Donatien-Charon

, Mijail Borges-Quintana
, Miguel A. Borges-Trenard
, Omar Rojas
, Guillermo Sosa-Gómez
:
On Tabu Search for Block Cyphers Cryptanalysis. 8 - Jimmy Dani

, Kalyan Nakka
, Nitesh Saxena
:
MIND-Crypt: A Machine Learning Framework for Assessing the Indistinguishability of Lightweight Block Ciphers Across Multiple Modes of Operation. 9 - Chuanming Zong

:
Some Mathematical Problems Behind Lattice-Based Cryptography. 10 - Maya Thabet

, Antonia Tsili
, Konstantinos Krilakis, Dimitris Syvridis
:
Post-Quantum PKI: A Survey of Applications and Benchmarking Practices. 11 - Sang-Yoon Chang

, Qaiser Khan
:
Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions. 12 - Valli Kumari Vatsavayi, Dinesh Reddy Bommireddy

:
Secure and Efficient Block Cipher Mode Design for Parallel Processing and Reliable Security. 13 - Magdalena Bertram

, Benjamin Zengin
, Nicolas Buchmann
, Marian Margraf
:
Strong Non-Transferability from Randomizable Universal Designated Verifier Signatures. 14

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














