![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Cryptography, Volume 5
Volume 5, Number 1, March 2021
- Sarah A. Alzakari
, Poorvi L. Vora:
Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck. 1 - Tushar Kanti Saha
, Takeshi Koshiba
:
Efficient Private Conjunctive Query Protocol Over Encrypted Data. 2 - Alexandru Cojocaru
, Léo Colisson
, Elham Kashefi, Petros Wallden
:
On the Possibility of Classical Client Blind Quantum Computing. 3 - Bayan Ibrahimm Alabdullah
, Natalia Beloff
, Martin White
:
E-ART: A New Encryption Algorithm Based on the Reflection of Binary Search Tree. 4 - Acknowledgment to Reviewers of Cryptography in 2020. 5
- Malek Safieh, Jürgen Freudenberger
:
Montgomery Reduction for Gaussian Integers. 6 - Holden Gordon, Jack Edmonds, Soroor Ghandali, Wei Yan
, Nima Karimian
, Fatemeh Tehranipoor
:
Flash-Based Security Primitives: Evolution, Challenges and Future Directions. 7 - Bertrand Cambou, Donald Telesca, Sareh Assiri, Michael Garrett, Saloni Jain, Michael Partridge:
TRNGs from Pre-Formed ReRAM Arrays. 8 - Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri
, Navid Asadizanjani:
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It? 9 - Niluka Amarasinghe, Xavier Boyen, Matthew McKague:
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration. 10 - Jürgen Freudenberger
, Johann-Philipp Thiers
:
A New Class of Q-Ary Codes for the McEliece Cryptosystem. 11
Volume 5, Number 2, June 2021
- Yu-Cheng Chen, Vincent John Mooney, Santiago Grijalva:
Grid Cyber-Security Strategy in an Attacker-Defender Model. 12 - Ehsan Aerabi, David Hély
, Cyril Bresch, Athanasios Papadimitriou, Mahdi Fazeli:
CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes. 13 - Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila
:
Associative Blockchain for Decentralized PKI Transparency. 14 - Jacob T. Grycel
, Patrick Schaumont
:
SimpliFI: Hardware Simulation of Embedded Software Fault Attacks. 15
Volume 5, Number 3, September 2021
- Davide Bellizia
, Riccardo Della Sala
, Giuseppe Scotti
:
SC-DDPL as a Countermeasure against Static Power Side-Channel Attacks. 16 - Hibiki Ono, Yoshifumi Manabe
:
Minimum Round Card-Based Cryptographic Protocols Using Private Operations. 17 - Yutian Gui, Chaitanya Bhure
, Marcus Hughes, Fareena Saqib:
A Delay-Based Machine Learning Model for DMA Attack Mitigation. 18 - Minhye Seo:
Fair and Secure Multi-Party Computation with Cheater Detection. 19 - Kabiru Mohammed
, Aladdin Ayesh
, Eerke A. Boiten
:
Complementing Privacy and Utility Trade-Off with Self-Organising Maps. 20 - Andre Ostrak
, Jaak Randmets, Ville Sokk, Sven Laur, Liina Kamm
:
Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification. 21 - Sven Laur
, Pille Pullonen-Raudvere
:
Foundations of Programmable Secure Computation. 22 - Riccardo Della Sala
, Davide Bellizia
, Giuseppe Scotti
:
A Novel Ultra-Compact FPGA PUF: The DD-PUF. 23 - Dor Salomon, Amir Weiss
, Itamar Levi
:
Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis. 24 - Netanel Klein, Eyal Harel, Itamar Levi
:
The Cost of a True Random Bit - On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs. 25
Volume 5, Number 4, 2021
- Julian Danner, Martin Kreuzer
:
A Fault Attack on the Family of Enocoro Stream Ciphers. 26 - Mohammad Anagreh
, Peeter Laud
, Eero Vainikko
:
Parallel Privacy-Preserving Shortest Path Algorithms. 27 - Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin, Paulo Cesar G. da Costa, Setareh Rafatirad, Houman Homayoun:
Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach. 28 - Irene Ioannidou, Nicolas Sklavos
:
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications. 29 - Bang Yuan Chong, Iftekhar Salam
:
Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms. 30 - Alessandro Budroni
, Qian Guo
, Thomas Johansson
, Erik Mårtensson
, Paul Stankovski Wagner
:
Improvements on Making BKW Practical for Solving LWE. 31 - Emad Hamadaqa, Saleh Mulhem
, Wael Adi, Mladen Berekovic
:
Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies. 32 - Johann-Philipp Thiers
, Jürgen Freudenberger
:
Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography. 33 - Konstantinos Limniotis
:
Cryptography as the Means to Protect Fundamental Human Rights. 34 - K. S. Suvidha, Jothi Rangasamy, Shyam S. Kamath, Cheng-Chi Lee
:
ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks. 35 - Diego Romano
, Giovanni Schmid
:
Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology. 36 - Noha Ezzat El-Attar
, Doaa S. El-Morshedy, Wael A. Awad:
A New Hybrid Automated Security Framework to Cloud Storage System. 37 - Chithralekha Balamurugan, Kalpana Singh
, Ganeshvani Ganesan, Muttukrishnan Rajarajan:
Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions. 38
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.