


default search action
Cryptography, Volume 9
Volume 9, Number 1, 2024
- Mohammad Anagreh

, Peeter Laud
:
Security Proof of Single-Source Shortest Distance Protocols Built on Secure Multiparty Computation Protocols. 1 - George Teseleanu

:
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems. 2 - Jihane Jebrane

, Akram Chhaybi
, Saiida Lazaar
, Abderrahmane Nitaj
:
Elliptic Curve Cryptography with Machine Learning. 3 - Ching-Chun Chang, Yijie Lin, Jui-Chuan Liu, Chin-Chen Chang:

Reversible Data Hiding in Absolute Moment Block Truncation Codes via Arithmetical and Logical Differential Coding. 4
Volume 9, Number 1, 2025
- Vincent Meyers

, Michael Hefenbrock
, Dennis Gnad
, Mehdi B. Tahoori
:
Leveraging Neural Trojan Side-Channels for Output Exfiltration. 5 - Jiaming Wu

, Olivia P. Dizon-Paradis
, M. Sazadur Rahman, Damon L. Woodard
, Domenic Forte
:
Protecting Dynamically Obfuscated Scan Chain Architecture from DOSCrack with Trivium Pseudo-Random Number Generation. 6 - Thekaa Ali Kadhim, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi

, Zahraa Abdullah Ali, Iman Qays Abduljaleel
:
Lightweight Scheme for Secure Signaling and Data Exchanges in Intelligent Precision Agriculture. 7 - Madusha Chathurangi

, Qinyi Li, Ernest Foo:
On Advances of Anonymous Credentials - From Traditional to Post-Quantum. 8 - Hsia-Hung Ou, Guan-Yu Chen, Iuon-Chang Lin

:
A Self-Sovereign Identity Blockchain Framework for Access Control and Transparency in Financial Institutions. 9 - Xiaoqi Liu

, Guillermo Morales-Luna
:
On the Effectiveness of a Common Attack to Chebyshev Chaotic Encryption Scheme. 10 - Marta Irene García Cid

, Rodrigo Martín
, David Domingo, Vicente Martín, Laura Ortíz:
Design and Implementation of a Quantum-Assisted Digital Signature. 11 - Mojtaba Fadavi, Sabyasachi Karati, Aylar Erfanian, Reihaneh Safavi-Naini

:
DGMT: A Fully Dynamic Group Signature from Symmetric-Key Primitives. 12 - Ming Luo

, Mingsheng Wang:
Faster Spiral: Low-Communication, High-Rate Private Information Retrieval. 13 - Kung-Wei Hu

, Huan-Chih Wang
, Wun-Ting Lin
, Ja-Ling Wu
:
Optimizing Message Range and Ciphertext Storage in Gentry-Sahai-Waters Encryption Using Chinese Remainder Theorem and PVW-like Compression Scheme. 14 - Qinming Zhou, Haozhi Xie, Tao Su

:
The Impact of Clock Frequencies on Remote Power Side-Channel Analysis Attack Resistance of Processors in Multi-Tenant FPGAs. 15 - Vasiliki Liagkou

, Panagiotis E. Nastou, Paul G. Spirakis
, Yannis C. Stamatiou:
Construction of Countably Infinite Programs That Evade Malware/Non-Malware Classification for Any Given Formal System. 16 - Hamed Taherdoost

, Tuan-Vinh Le
, Khadija Slimani
:
Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review. 17 - Xinyue Zhang, Daoguang Mu, Wenzheng Zhang, Xinfeng Dong:

Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework. 18 - Costin Ghiban, Marios Omar Choudary:

Improved Correlation Power Analysis Attack on the Latest Cortex M4 Kyber Implementation. 19 - Rares Ifrim

, Decebal Popescu
:
BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis. 20
Volume 9, Number 2, 2025
- Phuc-Phan Duong

, Tuan-Kiet Dang
, Trong-Thuc Hoang, Cong-Kha Pham
:
Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24). 21 - Dahhak Hajar

, Nadia Afifi, Imane Hilal
:
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience. 22 - Xiansong Qian

, Lifei Wei
, Jinjiao Zhang
, Lei Zhang
:
Malicious-Secure Threshold Multi-Party Private Set Intersection for Anonymous Electronic Voting. 23 - Phuc-Phan Duong

, Tuan-Kiet Dang
, Trong-Thuc Hoang, Cong-Kha Pham
:
Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24). 21 - Dahhak Hajar

, Nadia Afifi, Imane Hilal
:
Dynamic Sharding and Monte Carlo for Post-Quantum Blockchain Resilience. 22 - Xiansong Qian

, Lifei Wei
, Jinjiao Zhang
, Lei Zhang
:
Malicious-Secure Threshold Multi-Party Private Set Intersection for Anonymous Electronic Voting. 23 - Manar Alnasser, Shancang Li:

Privacy-Enhancing Technologies in Collaborative Healthcare Analysis. 24 - Ottó Hanyecz

, András Bodor
, Peter Adam
, Mátyás Koniorczyk
:
Bell-Clauser-Horne-Shimony-Holt Behavior Under Quantum Loss and Decoherence. 25 - Mykhailo Kasianchuk, Ruslan Shevchuk

, Bogdan Adamyk
, Vladlena Benson, Inna Shylinska, Mykhailo Holembiovskyi:
Affine Cipher Encryption Technique Using Residue Number System. 26 - Alex Shafarenko

:
Non-Degenerate One-Time Pad and Unconditional Integrity of Perfectly Secret Messages. 27 - Iuon-Chang Lin

, Ko-Yu Lin, Nan-I Wu, Min-Shiang Hwang
:
A Quantum Key Distribution for Securing Smart Grids. 28 - Anastasios N. Bikos

:
PRIVocular: Enhancing User Privacy Through Air-Gapped Communication Channels. 29 - Hanbing Li, Kexin Qiao

, Ye Xu, Changhai Ou
, An Wang
:
General Extensions and Improvements of Algebraic Persistent Fault Analysis. 30 - Siddhartha Siddhiprada Bhoi

, Arathi Arakala
, Amy Beth Corman
, Asha Rao
:
Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives. 31 - Maryam Abbasi

, Filipe Gonçalves Cardoso
, Paulo Váz
, José Silva
, Pedro Martins:
A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments. 32 - William J. Buchanan

, Hisham Ali
:
Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption. 33 - Venkata K. V. V. Bathalapalli

, Saraju P. Mohanty
, Chenyun Pan
, Elias Kougianos
:
QPUF: Quantum Physical Unclonable Functions for Security-by-Design of Industrial Internet-of-Things. 34 - Salem AlJanah

, Ning Zhang
, Siok Wah Tay
:
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications. 35 - Zulfikar Zulfikar

, Hubbul Walidainy, Aulia Rahman
, Kahlil Muchtar
:
Reliability Improvement of 28 nm Intel FPGA Ring Oscillator PUF for Chip Identification. 36 - Atef Ibrahim

, Fayez Gebali:
Enhancing Security for Resource-Constrained Smart Cities IoT Applications: Optimizing Cryptographic Techniques with Effective Field Multipliers. 37 - Manohar Raavi

, Qaiser Khan
, Simeon Wuthier
, Pranav Chandramouli, Yaroslav Balytskyi
, Sang-Yoon Chang
:
Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations. 38 - Ali Abdullah S. AlQahtani

:
Key Derivation: A Dynamic PBKDF2 Model for Modern Cryptographic Systems. 39 - Mohammed Rahmani

, Abderrahmane Nitaj
, Abdelhamid Tadmori
, M'hammed Ziane:
An Improved Attack on the RSA Variant Based on Cubic Pell Equation. 40 - Bo Mi

, Siyuan Zeng, Ran Zeng, Fuyuan Wang, Qi Zhou:
Multiparty Homomorphic Encryption for IoV Based on Span Program and Conjugate Search Problem. 41 - Dawoon Kwon

, Junghwan Song:
Computing the Differential Probability of a Word-Based Block Cipher. 42 - Cheng-Chi Lee

, Tuan-Vinh Le
, Chun-Ta Li
, Dinh-Thuan Do, Agbotiname Lucky Imoize
:
Advances in Authentication, Authorization and Privacy for Securing Smart Communications. 43 - Dongfang Zhao:

Compile-Time Fully Homomorphic Encryption: Eliminating Online Encryption via Algebraic Basis Synthesis. 44 - Ismel Martínez-Díaz

, Carlos Miguel Legón-Pérez
, Guillermo Sosa-Gómez
:
Generation of Affine-Shifted S-Boxes with Constant Confusion Coefficient Variance and Application in the Partitioning of the S-Box Space. 45 - Hai Huang, Jiwen Zheng, Zhengyu Chen, Shilei Zhao, Hongwei Wu, Bin Yu, Zhiwei Liu:

Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems. 46
Volume 9, Number 3, 2025
- Holger Mandry

, Julian Spiess, Bjoern Driemeyer
, Joachim Becker
, Maurits Ortmanns
:
The Eye-Opening Arbiter-PUF FPGA Implementation with Auto Error Detection. 47 - Nikola Hristov-Kalamov

, Raúl Fernández-Ruiz
, Agustín Álvarez-Marquina, Julio Guillen-Garcia
, Roberto Gallardo-Cava
, Daniel Palacios-Alonso
:
Composable Privacy-Preserving Framework for Stakes-Based Online Peer-to-Peer Applications. 48 - Ran Chu

, Jun Mou
, Yuanhui Cui:
Image Encryption with Dual Watermark Based on Chaotic Map. 49 - Dongyu Wu

, Bei Liang
, Zijie Lu
, Jintai Ding
:
Efficient Secure Multi-Party Computation for Multi-Dimensional Arithmetics and Its Applications. 50 - Xinyao Li

, Akhilesh Tyagi
:
Multi-Line Prefetch Covert Channel with Huge Pages. 51 - Abdul Ghafoor

, Iraklis Symeonidis
, Anna Rydberg
, Cecilia Lindahl
, Abdul Qadus Abbasi:
Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing. 52 - Sana Challi, Mukul Kulkarni, Taoufik Serraj:

A New Code-Based Identity-Based Signature Scheme from the Ternary Large-Weight SDP. 53 - Afef Kchaou

, Sehmi Saad
, Hatem Garrab, Mohsen Machhout:
Reliability of LEON3 Processor's Program Counter Against SEU, MBU, and SET Fault Injection. 54 - Kung-Wei Hu

, Wun-Ting Lin
, Huan-Chih Wang
, Ja-Ling Wu
:
Enhancing the Multikey GSW Scheme with CRT Decomposition and Ciphertext Compression for Efficient Distributed Decryption. 55 - Sunil Kumar, Dharminder Chaudhary, S. A. Lakshmanan

, Cheng-Chi Lee
:
Novel Approach to Degree, Balancedness, and Affine Equivalence of Boolean Functions and Construction of a Special Class of Non-Quadratic Balanced Boolean Functions. 56 - Xiyuan Cheng, Tiancong Cheng, Xinyu Yang, Wenbin Cheng

, Yiting Lin
:
A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography. 57 - Alexandru Dinu

:
From Chaos to Security: A Comparative Study of Lorenz and Rössler Systems in Cryptography. 58 - Kwan Yin Chan

, Tsz Hon Yuen
, Siu Ming Yiu:
Universally Composable Traceable Ring Signature with Verifiable Random Function in Logarithmic Size. 59

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














