![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Cryptography, Volume 3
Volume 3, Number 1, March 2019
- Muhammad Rezal Kamel Ariffin, Saidu Isah Abubakar
, Faridah Yunos, Muhammad Asyraf Asbullah
:
New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method. 2 - Asad Ali Siyal
, Aisha Zahid Junejo
, Muhammad Zawish
, Kainat Ahmed, Aiman Khalil
, Georgia Soursou
:
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives. 3 - Ashutosh Dhar Dwivedi
, Shalini Dhar
, Gautam Srivastava
, Rajani Singh
:
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM. 4 - Acknowledgement to Reviewers of Cryptography in 2018. 5
- Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain:
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes. 6 - Karuna Pande Joshi
, Agniva Banerjee:
Automating Privacy Compliance Using Policy Integrated Blockchain. 7 - Le Van Luyen:
An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow. 8 - Luigi Accardi, Satoshi Iriyama
, Koki Jimbo, Massimo Regoli
:
A New Class of Strongly Asymmetric PKA Algorithms: SAA-5. 9 - Syed Kamran Haider
, Marten van Dijk:
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors. 10
Volume 3, Number 2, June 2019
- Ayoub Mars
, Wael Adi:
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures. 11 - Bhupendra Nath Tiwari, Jude Kibinde Kuipo, Joshua Muyiwa Adeegbe, Ninoslav Marina
:
Optimized AKS Primality Testing: A Fluctuation Theory Perspective. 12 - Tariq Shah, Ayesha Qureshi:
S-Box on Subgroup of Galois Field. 13 - Mohamad Ali Mehrabi
:
Improved Sum of Residues Modular Multiplication Algorithm. 14 - Sally Lin Pei Ching, Faridah Yunos
:
Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction. 15 - Ibou Sene
, Abdoul Aziz Ciss
, Oumar Niang:
I2PA: An Efficient ABC for IoT. 16
Volume 3, Number 3, September 2019
- Md Shahed Enamul Quadir
, John A. Chandy
:
Key Generation for Hardware Obfuscation Using Strong PUFs. 17 - Jeff Calhoun, Cyrus Minwalla
, Charles Helmich, Fareena Saqib, Wenjie Che, Jim Plusquellic
:
Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash). 18 - Maki Kihara
, Satoshi Iriyama:
New Authentication Algorithm Based on Verifiable Encryption with Digital Identity. 19 - Sitalakshmi Venkatraman
, Anthony Overmars
:
New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. 20 - Amit Phadikar
, Poulami Jana, Himadri S. Mandal:
Reversible Data Hiding for DICOM Image Using Lifting and Companding. 21 - Kai-Min Chung
, Marios Georgiou, Ching-Yi Lai
, Vassilis Zikas:
Cryptography with Disposable Backdoors. 22 - Matthew Campagna, Shay Gueron:
Key Management Systems at the Cloud Scale. 23 - Alzahraa J. Mohammed, Ali A. Yassin:
Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device. 24
Volume 3, Number 4, December 2019
- Lukas Fladung, Georgios M. Nikolopoulos
, Gernot Alber
, Marc Fischlin:
Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys. 25 - Niraj Kumar:
Practically Feasible Robust Quantum Money with Classical Verification. 26 - Brian Coyle
, Elham Kashefi, Matty J. Hoban:
Certified Randomness From Steering Using Sequential Measurements. 27 - Saleh Mulhem
, Wael Adi:
New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices. 28
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.