Search dblp for Publications

export results for "stream:streams/journals/cryptography:"

 download as .bib file

@article{DBLP:journals/cryptography/BaigEY24,
  author       = {Ahmed Fraz Baig and
                  Sigurd Eskeland and
                  Bian Yang},
  title        = {Novel and Efficient Privacy-Preserving Continuous Authentication},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {3},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010003},
  doi          = {10.3390/CRYPTOGRAPHY8010003},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BaigEY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BeheraR24,
  author       = {Sagarika Behera and
                  Prathuri Jhansi Rani},
  title        = {FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic
                  Encrypted Data},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {8},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010008},
  doi          = {10.3390/CRYPTOGRAPHY8010008},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BeheraR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChenYLXCL24,
  author       = {Chang Chen and
                  Guoyu Yang and
                  Zhihao Li and
                  Fuan Xiao and
                  Qi Chen and
                  Jin Li},
  title        = {Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {6},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010006},
  doi          = {10.3390/CRYPTOGRAPHY8010006},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChenYLXCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JiangBSGPZZL24,
  author       = {Yinhao Jiang and
                  Mir Ali Rezazadeh Baee and
                  Leonie Ruth Simpson and
                  Praveen Gauravaram and
                  Josef Pieprzyk and
                  Tanveer A. Zia and
                  Zhen Zhao and
                  Zung Le},
  title        = {Pervasive User Data Collection from Cyberspace: Privacy Concerns and
                  Countermeasures},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {5},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010005},
  doi          = {10.3390/CRYPTOGRAPHY8010005},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KabilAA24,
  author       = {Ahmad Kabil and
                  Heba Aslan and
                  Marianne Azer},
  title        = {Cryptanalysis of Two Conditional Privacy Preserving Authentication
                  Schemes for Vehicular Ad Hoc Networks},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {4},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010004},
  doi          = {10.3390/CRYPTOGRAPHY8010004},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KabilAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NingCSC24,
  author       = {Yan{-}Duan Ning and
                  Yan{-}Haw Chen and
                  Cheng{-}Sin Shih and
                  Shao{-}I Chu},
  title        = {Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve
                  Cryptography},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {11},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010011},
  doi          = {10.3390/CRYPTOGRAPHY8010011},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NingCSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SebeS24,
  author       = {Francesc Seb{\'{e}} and
                  Sergi Sim{\'{o}}n},
  title        = {E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {10},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010010},
  doi          = {10.3390/CRYPTOGRAPHY8010010},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SebeS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SelvamT24,
  author       = {Ravikumar Selvam and
                  Akhilesh Tyagi},
  title        = {Residue Number System {(RNS)} and Power Distribution Network Topology-Based
                  Mitigation of Power Side-Channel Attacks},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {1},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010001},
  doi          = {10.3390/CRYPTOGRAPHY8010001},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SelvamT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TsantikidouS24,
  author       = {Kyriaki Tsantikidou and
                  Nicolas Sklavos},
  title        = {Threats, Attacks, and Cryptography Frameworks of Cybersecurity in
                  Critical Infrastructures},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {7},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010007},
  doi          = {10.3390/CRYPTOGRAPHY8010007},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TsantikidouS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/UpadhyayaGP24,
  author       = {Devanshi Upadhyaya and
                  Ma{\"{e}}l Gay and
                  Ilia Polian},
  title        = {Locking-Enabled Security Analysis of Cryptographic Circuits},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {2},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010002},
  doi          = {10.3390/CRYPTOGRAPHY8010002},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/UpadhyayaGP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/UzunerK24,
  author       = {Hakan Uzuner and
                  Elif Bilge Kavun},
  title        = {{NLU-V:} {A} Family of Instruction Set Extensions for Efficient Symmetric
                  Cryptography on {RISC-V}},
  journal      = {Cryptogr.},
  volume       = {8},
  number       = {1},
  pages        = {9},
  year         = {2024},
  url          = {https://doi.org/10.3390/cryptography8010009},
  doi          = {10.3390/CRYPTOGRAPHY8010009},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/UzunerK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AbuFarajAOAAAA23,
  author       = {Mua'ad Abu{-}Faraj and
                  Abeer Y. Al{-}Hyari and
                  Charlie Obimbo and
                  Khaled Aldebei and
                  Ismail Al{-}Taharwa and
                  Ziad A. Alqadi and
                  Orabe Almanaseer},
  title        = {Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic
                  Maps},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {20},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020020},
  doi          = {10.3390/CRYPTOGRAPHY7020020},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AbuFarajAOAAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Alawatugoda23,
  author       = {Janaka Alawatugoda},
  title        = {Authenticated Key Exchange Protocol in the Standard Model under Weaker
                  Assumptions},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {1},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010001},
  doi          = {10.3390/CRYPTOGRAPHY7010001},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Alawatugoda23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlmukhlifiV23,
  author       = {Reham Almukhlifi and
                  Poorvi L. Vora},
  title        = {Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {8},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010008},
  doi          = {10.3390/CRYPTOGRAPHY7010008},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlmukhlifiV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlupothaBM23,
  author       = {Jayamine Alupotha and
                  Xavier Boyen and
                  Matthew McKague},
  title        = {{LACT+:} Practical Post-Quantum Scalable Confidential Transactions},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {24},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020024},
  doi          = {10.3390/CRYPTOGRAPHY7020024},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlupothaBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AmpatzisA23,
  author       = {Michael Ampatzis and
                  Theodore Andronikos},
  title        = {Quantum Secret Aggregation Utilizing a Network of Agents},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {5},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010005},
  doi          = {10.3390/CRYPTOGRAPHY7010005},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AmpatzisA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AndronikosS23,
  author       = {Theodore Andronikos and
                  Alla Sirokofskich},
  title        = {One-to-Many Simultaneous Secure Quantum Information Transmission},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {64},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040064},
  doi          = {10.3390/CRYPTOGRAPHY7040064},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/AndronikosS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AugustS23,
  author       = {David A. August and
                  Anne C. Smith},
  title        = {PudgyTurtle Mode Resists Bit-Flipping Attacks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {25},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020025},
  doi          = {10.3390/CRYPTOGRAPHY7020025},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AugustS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BespalovKNOV23,
  author       = {Yuri Bespalov and
                  Lyudmila Kovalchuk and
                  Hanna Nelasa and
                  Roman Oliynykov and
                  Rob Viglione},
  title        = {Models for Generation of Proof Forest in zk-SNARK Based Sidechains},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {14},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010014},
  doi          = {10.3390/CRYPTOGRAPHY7010014},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BespalovKNOV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BikosNPS23,
  author       = {Anastasios N. Bikos and
                  Panagiotis E. Nastou and
                  Georgios Petroudis and
                  Yannis C. Stamatiou},
  title        = {Random Number Generators: Principles and Applications},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {54},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040054},
  doi          = {10.3390/CRYPTOGRAPHY7040054},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BikosNPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BoudabraN23,
  author       = {Maher Boudabra and
                  Abderrahmane Nitaj},
  title        = {A New {RSA} Variant Based on Elliptic Curves},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {37},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030037},
  doi          = {10.3390/CRYPTOGRAPHY7030037},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BoudabraN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CamachoRuizMSB23,
  author       = {Eros Camacho{-}Ruiz and
                  Macarena C. Mart{\'{\i}}nez{-}Rodr{\'{\i}}guez and
                  Santiago S{\'{a}}nchez{-}Solano and
                  Piedad Brox},
  title        = {Timing-Attack-Resistant Acceleration of {NTRU} Round 3 Encryption
                  on Resource-Constrained Embedded Systems},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {29},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020029},
  doi          = {10.3390/CRYPTOGRAPHY7020029},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CamachoRuizMSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CatuognoG23,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  title        = {Secure Firmware Update: Challenges and Solutions},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {30},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020030},
  doi          = {10.3390/CRYPTOGRAPHY7020030},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CatuognoG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Cesati23,
  author       = {Marco Cesati},
  title        = {A New Idea for {RSA} Backdoors},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {45},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030045},
  doi          = {10.3390/CRYPTOGRAPHY7030045},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Cesati23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ClearT23,
  author       = {Michael Clear and
                  Hitesh Tewari},
  title        = {Anonymous Homomorphic {IBE} with Application to Anonymous Aggregation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {22},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020022},
  doi          = {10.3390/CRYPTOGRAPHY7020022},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ClearT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DamTHPH23,
  author       = {Duc{-}Thuan Dam and
                  Thai{-}Ha Tran and
                  Van{-}Phuc Hoang and
                  Cong{-}Kha Pham and
                  Trong{-}Thuc Hoang},
  title        = {A Survey of Post-Quantum Cryptography: Start of a New Race},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {40},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030040},
  doi          = {10.3390/CRYPTOGRAPHY7030040},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DamTHPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DamodharanMS23,
  author       = {Jamunarani Damodharan and
                  Emalda Roslin Susai Michael and
                  Nasir Shaikh{-}Husin},
  title        = {High Throughput {PRESENT} Cipher Hardware Architecture for the Medical
                  IoT Applications},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {6},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010006},
  doi          = {10.3390/CRYPTOGRAPHY7010006},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DamodharanMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DeCusatisGIPPV23,
  author       = {Casimer M. DeCusatis and
                  Brian Gormanly and
                  John Iacino and
                  Reed Percelay and
                  Alex Pingue and
                  Justin Valdez},
  title        = {Cybersecurity Test Bed for Smart Contracts},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {15},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010015},
  doi          = {10.3390/CRYPTOGRAPHY7010015},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DeCusatisGIPPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DolmetaMM23,
  author       = {Alessandra Dolmeta and
                  Maurizio Martina and
                  Guido Masera},
  title        = {Comparative Study of Keccak {SHA-3} Implementations},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {60},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040060},
  doi          = {10.3390/CRYPTOGRAPHY7040060},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DolmetaMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DuanLL23,
  author       = {Li Duan and
                  Yong Li and
                  Lijun Liao},
  title        = {Practical Certificate-Less Infrastructure with Application in {TLS}},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {63},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040063},
  doi          = {10.3390/CRYPTOGRAPHY7040063},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DuanLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DunmoreSJ23,
  author       = {Aeryn Dunmore and
                  Juliet Samandari and
                  Julian Jang{-}Jaccard},
  title        = {Matrix Encryption Walks for Lightweight Cryptography},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {41},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030041},
  doi          = {10.3390/CRYPTOGRAPHY7030041},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DunmoreSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FengL23,
  author       = {Tao Feng and
                  Yufeng Liu},
  title        = {Research on PoW Protocol Security under Optimized Long Delay Attack},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {32},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020032},
  doi          = {10.3390/CRYPTOGRAPHY7020032},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FengL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GuoLJWF23,
  author       = {Xian Guo and
                  Ye Li and
                  Yongbo Jiang and
                  Jing Wang and
                  Junli Fang},
  title        = {Privacy-Preserving k-Nearest Neighbor Classification over Malicious
                  Participants in Outsourced Cloud Environments},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {59},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040059},
  doi          = {10.3390/CRYPTOGRAPHY7040059},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GuoLJWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GuoZGQL23,
  author       = {Yihong Guo and
                  Jinxin Zuo and
                  Ziyu Guo and
                  Jiahao Qi and
                  Yueming Lu},
  title        = {Data Sharing Privacy Metrics Model Based on Information Entropy and
                  Group Privacy Preference},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {11},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010011},
  doi          = {10.3390/CRYPTOGRAPHY7010011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GuoZGQL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HaddadPCLB23,
  author       = {Joseph Haddad and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas and
                  Mouad Lemoudden and
                  William J. Buchanan},
  title        = {Attacking Windows Hello for Business: Is It What We Were Promised?},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {9},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010009},
  doi          = {10.3390/CRYPTOGRAPHY7010009},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HaddadPCLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HeF23,
  author       = {Buzhen He and
                  Tao Feng},
  title        = {Encryption Scheme of Verifiable Search Based on Blockchain in Cloud
                  Environment},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {16},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020016},
  doi          = {10.3390/CRYPTOGRAPHY7020016},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HeF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HuL23,
  author       = {Hwai{-}Tsu Hu and
                  Tung{-}Tsun Lee},
  title        = {Hiding Full-Color Images into Audio with Visual Enhancement via Residual
                  Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {47},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040047},
  doi          = {10.3390/CRYPTOGRAPHY7040047},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/HuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KangS23,
  author       = {Jeong Hwa Kang and
                  Minhye Seo},
  title        = {Enhanced Authentication for Decentralized IoT Access Control Architecture},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {42},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030042},
  doi          = {10.3390/CRYPTOGRAPHY7030042},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KangS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KhashanKAAAAA23,
  author       = {Osama Ahmed Khashan and
                  Nour Mahmoud Khafajah and
                  Waleed Alomoush and
                  Mohammad Alshinwan and
                  Sultan Alamri and
                  Samer Atawneh and
                  Mutasem K. Alsmadi},
  title        = {Dynamic Multimedia Encryption Using a Parallel File System Based on
                  Multi-Core Processors},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {12},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010012},
  doi          = {10.3390/CRYPTOGRAPHY7010012},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KhashanKAAAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KodukhovPKKPV23,
  author       = {Aleksei D. Kodukhov and
                  Valeria A. Pastushenko and
                  Nikita S. Kirsanov and
                  Dmitry A. Kronberg and
                  Markus Pflitsch and
                  Valerii M. Vinokur},
  title        = {Boosting Quantum Key Distribution via the End-to-End Loss Control},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {38},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030038},
  doi          = {10.3390/CRYPTOGRAPHY7030038},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KodukhovPKKPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KorziliusS23,
  author       = {Stan Korzilius and
                  Berry Schoenmakers},
  title        = {Divisions and Square Roots with Tight Error Analysis from Newton-Raphson
                  Iteration in Secure Fixed-Point Arithmetic},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {43},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030043},
  doi          = {10.3390/CRYPTOGRAPHY7030043},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KorziliusS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KoyamaTFBT23,
  author       = {Atsuki Koyama and
                  Van Chuong Tran and
                  Manato Fujimoto and
                  Vo Nguyen Quoc Bao and
                  Thi Hong Tran},
  title        = {A Decentralized {COVID-19} Vaccine Tracking System Using Blockchain
                  Technology},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {13},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010013},
  doi          = {10.3390/CRYPTOGRAPHY7010013},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KoyamaTFBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KulkarniKTIB23,
  author       = {Pallavi Kulkarni and
                  Rajashri Khanai and
                  Dattaprasad Torse and
                  Nalini Iyer and
                  Gururaj Bindagi},
  title        = {Neural Crypto-Coding Based Approach to Enhance the Security of Images
                  over the Untrusted Cloud Environment},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {23},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020023},
  doi          = {10.3390/CRYPTOGRAPHY7020023},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KulkarniKTIB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KurokawaISYU23,
  author       = {Takashi Kurokawa and
                  Takuma Ito and
                  Naoyuki Shinohara and
                  Akihiro Yamamura and
                  Shigenori Uchiyama},
  title        = {Selection Strategy of F4-Style Algorithm to Solve {MQ} Problems Related
                  to {MPKC}},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {10},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010010},
  doi          = {10.3390/CRYPTOGRAPHY7010010},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KurokawaISYU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LataC23,
  author       = {Kusum Lata and
                  Linga Reddy Cenkeramaddi},
  title        = {FPGA-Based {PUF} Designs: {A} Comprehensive Review and Comparative
                  Analysis},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {55},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040055},
  doi          = {10.3390/CRYPTOGRAPHY7040055},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LataC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LeeGSAL23,
  author       = {Cheng{-}Chi Lee and
                  Mehdi Gheisari and
                  Mohammad Javad Shayegan and
                  Milad Taleby Ahvanooey and
                  Yang Liu},
  title        = {Privacy-Preserving Techniques in Cloud/Fog and Internet of Things},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {51},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040051},
  doi          = {10.3390/CRYPTOGRAPHY7040051},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LeeGSAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LeevikDB23,
  author       = {Anton Leevik and
                  Vadim Davydov and
                  Sergey Bezzateev},
  title        = {Threshold Lattice-Based Signature Scheme for Authentication by Wearable
                  Devices},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {33},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030033},
  doi          = {10.3390/CRYPTOGRAPHY7030033},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LeevikDB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LellaS23,
  author       = {Eufemia Lella and
                  Giovanni Schmid},
  title        = {On the Security of Quantum Key Distribution Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {53},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040053},
  doi          = {10.3390/CRYPTOGRAPHY7040053},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LellaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Li23,
  author       = {Yamin Li},
  title        = {Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub
                  Based Modular Multiplication Algorithms},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {57},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040057},
  doi          = {10.3390/CRYPTOGRAPHY7040057},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LinLW23,
  author       = {Je{-}Kuan Lin and
                  Wun{-}Ting Lin and
                  Ja{-}Ling Wu},
  title        = {Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based
                  Encryption Schemes},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {28},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020028},
  doi          = {10.3390/CRYPTOGRAPHY7020028},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LinLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LiuHTTHY23,
  author       = {Jinhui Liu and
                  Tianyi Han and
                  Maolin Tan and
                  Bo Tang and
                  Wei Hu and
                  Yong Yu},
  title        = {A Publicly Verifiable E-Voting System Based on Biometrics},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {62},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040062},
  doi          = {10.3390/CRYPTOGRAPHY7040062},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LiuHTTHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LizamaPerez23,
  author       = {Luis Adri{\'{a}}n Lizama{-}P{\'{e}}rez},
  title        = {{XOR} Chain and Perfect Secrecy at the Dawn of the Quantum Era},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {50},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040050},
  doi          = {10.3390/CRYPTOGRAPHY7040050},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LizamaPerez23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MaimutT23,
  author       = {Diana Maimut and
                  George Teseleanu},
  title        = {Inferring Bivariate Polynomials for Homomorphic Encryption Application},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {31},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020031},
  doi          = {10.3390/CRYPTOGRAPHY7020031},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MaimutT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MezinaO23,
  author       = {Anzhelika Mezina and
                  Aleksandr Ometov},
  title        = {Detecting Smart Contract Vulnerabilities with Combined Binary and
                  Multiclass Classification},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {34},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030034},
  doi          = {10.3390/CRYPTOGRAPHY7030034},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/MezinaO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MohanA23,
  author       = {Navya Mohan and
                  J. P. Anita},
  title        = {Early Detection of Clustered Trojan Attacks on Integrated Circuits
                  Using Transition Delay Fault Model},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010004},
  doi          = {10.3390/CRYPTOGRAPHY7010004},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MohanA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NagarajanRTKG23,
  author       = {Karthikeyan Nagarajan and
                  Rupshali Roy and
                  Rasit Onur Topaloglu and
                  Sachhidh Kannan and
                  Swaroop Ghosh},
  title        = {{SCANN:} Side Channel Analysis of Spiking Neural Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {17},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020017},
  doi          = {10.3390/CRYPTOGRAPHY7020017},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NagarajanRTKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NguyenPH23,
  author       = {Trong{-}Hung Nguyen and
                  Cong{-}Kha Pham and
                  Trong{-}Thuc Hoang},
  title        = {A High-Efficiency Modular Multiplication Digital Signal Processing
                  for Lattice-Based Post-Quantum Cryptography},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {46},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040046},
  doi          = {10.3390/CRYPTOGRAPHY7040046},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/NguyenPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NicholasATS23,
  author       = {Geraldine Shirley Nicholas and
                  Dhruvakumar Vikas Aklekar and
                  Bhavin Thakar and
                  Fareena Saqib},
  title        = {Secure Instruction and Data-Level Information Flow Tracking Model
                  for {RISC-V}},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {58},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040058},
  doi          = {10.3390/CRYPTOGRAPHY7040058},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/NicholasATS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NitajR23,
  author       = {Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Applications of Neural Network-Based {AI} in Cryptography},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {39},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030039},
  doi          = {10.3390/CRYPTOGRAPHY7030039},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/NitajR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Office23,
  author       = {Cryptography Editorial Office},
  title        = {Acknowledgment to the Reviewers of Cryptography in 2022},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010003},
  doi          = {10.3390/CRYPTOGRAPHY7010003},
  timestamp    = {Fri, 21 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Office23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PapadopoulosW23,
  author       = {Iason Papadopoulos and
                  Jiabo Wang},
  title        = {Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {2},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010002},
  doi          = {10.3390/CRYPTOGRAPHY7010002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PapadopoulosW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ParkKM23,
  author       = {Seonghwan Park and
                  Hyunil Kim and
                  Inkyu Moon},
  title        = {Automated Classical Cipher Emulation Attacks via Unified Unsupervised
                  Generative Adversarial Networks},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {35},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030035},
  doi          = {10.3390/CRYPTOGRAPHY7030035},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/ParkKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ParrillaGCRM23,
  author       = {Luis Parrilla and
                  Antonio Garc{\'{\i}}a and
                  Encarnaci{\'{o}}n Castillo and
                  Juan Antonio L{\'{o}}pez Ramos and
                  Uwe Meyer{-}Baese},
  title        = {Revisiting Multiple Ring Oscillator-Based True Random Generators to
                  Achieve Compact Implementations on FPGAs for Cryptographic Applications},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {26},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020026},
  doi          = {10.3390/CRYPTOGRAPHY7020026},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ParrillaGCRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PereiraTSMSP23,
  author       = {Bruno Miguel Batista Pereira and
                  Jos{\'{e}} Manuel Torres and
                  Pedro Miguel Sobral and
                  Rui S. Moreira and
                  Christophe Pinto de Almeida Soares and
                  Ivo Pereira},
  title        = {Blockchain-Based Electronic Voting: {A} Secure and Transparent Solution},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {27},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020027},
  doi          = {10.3390/CRYPTOGRAPHY7020027},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PereiraTSMSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RameshDSASS23,
  author       = {Raghunandan Ramesh and
                  Radhakrishna Dodmane and
                  Surendra Shetty and
                  Ganesh Aithal and
                  Monalisa Sahu and
                  Aditya Kumar Sahu},
  title        = {A Novel and Secure Fake-Modulus Based Rabin-{\cyrchar\CYRABHDZE} Cryptosystem},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {44},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030044},
  doi          = {10.3390/CRYPTOGRAPHY7030044},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/RameshDSASS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SalaS23,
  author       = {Riccardo Della Sala and
                  Giuseppe Scotti},
  title        = {A Novel {FPGA} Implementation of the {NAND-PUF} with Minimal Resource
                  Usage and High Reliability},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {18},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020018},
  doi          = {10.3390/CRYPTOGRAPHY7020018},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SalaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SchoenmakersS23,
  author       = {Berry Schoenmakers and
                  Toon Segers},
  title        = {Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty
                  Computation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {56},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040056},
  doi          = {10.3390/CRYPTOGRAPHY7040056},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SchoenmakersS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SoroceanuBM23,
  author       = {Tudor A. A. Soroceanu and
                  Nicolas Buchmann and
                  Marian Margraf},
  title        = {On Multiple Encryption for Public-Key Cryptography},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {49},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040049},
  doi          = {10.3390/CRYPTOGRAPHY7040049},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SoroceanuBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Taherdoost23,
  author       = {Hamed Taherdoost},
  title        = {The Role of Blockchain in Medical Data Sharing},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {36},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7030036},
  doi          = {10.3390/CRYPTOGRAPHY7030036},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Taherdoost23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TahirQKLA23,
  author       = {Mehwish Tahir and
                  Yuansong Qiao and
                  Nadia Kanwal and
                  Brian Lee and
                  Mamoona Naveed Asghar},
  title        = {Privacy Preserved Video Summarization of Road Traffic Events for IoT
                  Smart Cities},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {1},
  pages        = {7},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7010007},
  doi          = {10.3390/CRYPTOGRAPHY7010007},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TahirQKLA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TrivediBKT23,
  author       = {Devharsh Trivedi and
                  Aymen Boudguiga and
                  Nesrine Kaaniche and
                  Nikos Triandopoulos},
  title        = {SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {52},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040052},
  doi          = {10.3390/CRYPTOGRAPHY7040052},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/TrivediBKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/WalskaarTC23,
  author       = {Ivar Walskaar and
                  Minh Christian Tran and
                  Ferhat {\"{O}}zg{\"{u}}r {\c{C}}atak},
  title        = {A Practical Implementation of Medical Privacy-Preserving Federated
                  Learning Using Multi-Key Homomorphic Encryption and Flower Framework},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {48},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040048},
  doi          = {10.3390/CRYPTOGRAPHY7040048},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/WalskaarTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/YuMM23,
  author       = {Mingfei Yu and
                  Dewmini Sudara Marakkalage and
                  Giovanni De Micheli},
  title        = {Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure
                  Computation},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {4},
  pages        = {61},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7040061},
  doi          = {10.3390/CRYPTOGRAPHY7040061},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/YuMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Zajac23,
  author       = {Pavol Zajac},
  title        = {Algebraic Cryptanalysis with {MRHS} Equations},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {19},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020019},
  doi          = {10.3390/CRYPTOGRAPHY7020019},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Zajac23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZhouZWCZ23,
  author       = {Quan Zhou and
                  Yulong Zheng and
                  Kaijun Wei and
                  Minhui Chen and
                  Zhikang Zeng},
  title        = {A Multi-Party Functional Signatures Scheme for Private Blockchain},
  journal      = {Cryptogr.},
  volume       = {7},
  number       = {2},
  pages        = {21},
  year         = {2023},
  url          = {https://doi.org/10.3390/cryptography7020021},
  doi          = {10.3390/CRYPTOGRAPHY7020021},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZhouZWCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/0007S22,
  author       = {Tao Feng and
                  Jiewen Si},
  title        = {Certificateless Searchable Encryption Scheme in Multi-User Environment},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {61},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040061},
  doi          = {10.3390/CRYPTOGRAPHY6040061},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/0007S22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Abushgra22,
  author       = {Abdulbast A. Abushgra},
  title        = {Variations of {QKD} Protocols Based on Conventional System Measurements:
                  {A} Literature Review},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {12},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010012},
  doi          = {10.3390/CRYPTOGRAPHY6010012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Abushgra22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Adams22,
  author       = {Carlisle Adams},
  title        = {Improving User Privacy in Identity-Based Encryption Environments},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {55},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040055},
  doi          = {10.3390/CRYPTOGRAPHY6040055},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Adams22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AddobeaLOH22,
  author       = {Abigail Akosua Addobea and
                  Qianmu Li and
                  Isaac Amankona Obiri and
                  Jun Hou},
  title        = {A Batch Processing Technique for Wearable Health Crowd-Sensing in
                  the Internet of Things},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {33},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030033},
  doi          = {10.3390/CRYPTOGRAPHY6030033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AddobeaLOH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlmseidinAAA22,
  author       = {Mohammad Almseidin and
                  Mouhammd Alkasassbeh and
                  Maen Alzubi and
                  Jamil Al{-}Sawwa},
  title        = {Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {24},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020024},
  doi          = {10.3390/CRYPTOGRAPHY6020024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlmseidinAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ArfaouiAGT22,
  author       = {Ghada Arfaoui and
                  Gildas Avoine and
                  Olivier Gimenez and
                  Jacques Traor{\'{e}}},
  title        = {{ICRP:} Internet-Friendly Cryptographic Relay-Detection Protocol},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {52},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040052},
  doi          = {10.3390/CRYPTOGRAPHY6040052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ArfaouiAGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AzzoliniR22,
  author       = {Damiano Azzolini and
                  Fabrizio Riguzzi},
  title        = {Probabilistic Logic Models for the Lightning Network},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {29},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020029},
  doi          = {10.3390/CRYPTOGRAPHY6020029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AzzoliniR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BandaraHWA22,
  author       = {Harshana Bandara and
                  Yasitha Herath and
                  Thushara Weerasundara and
                  Janaka Alawatugoda},
  title        = {On Advances of Lattice-Based Cryptographic Schemes and Their Implementations},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {56},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040056},
  doi          = {10.3390/CRYPTOGRAPHY6040056},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BandaraHWA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BanerjeeT22,
  author       = {Aritra Banerjee and
                  Hitesh Tewari},
  title        = {Multiverse of HawkNess: {A} Universally-Composable MPC-Based Hawk
                  Variant},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {39},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030039},
  doi          = {10.3390/CRYPTOGRAPHY6030039},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BanerjeeT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BarenghiFP22,
  author       = {Alessandro Barenghi and
                  Gioele Falcetti and
                  Gerardo Pelosi},
  title        = {Locating Side Channel Leakage in Time through Matched Filters},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {26},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020026},
  doi          = {10.3390/CRYPTOGRAPHY6020026},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BarenghiFP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BazydloWK22,
  author       = {Grzegorz Bazydlo and
                  Remigiusz Wisniewski and
                  Kamil Kozdr{\'{o}}j},
  title        = {Trusted and Secure Blockchain-Based Durable Medium Electronic Service},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {10},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010010},
  doi          = {10.3390/CRYPTOGRAPHY6010010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BazydloWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CardellRF22,
  author       = {Sara D. Cardell and
                  Ver{\'{o}}nica Requena and
                  Amparo F{\'{u}}ster{-}Sabater},
  title        = {Computational Analysis of Interleaving PN-Sequences with Different
                  Polynomials},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {21},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020021},
  doi          = {10.3390/CRYPTOGRAPHY6020021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CardellRF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChauhanGG22,
  author       = {Sneha Chauhan and
                  Sugata Gangopadhyay and
                  Aditi Kar Gangopadhyay},
  title        = {Intrusion Detection System for IoT Using Logical Analysis of Data
                  and Information Gain Ratio},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {62},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040062},
  doi          = {10.3390/CRYPTOGRAPHY6040062},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChauhanGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CiampiRS22,
  author       = {Mario Ciampi and
                  Diego Romano and
                  Giovanni Schmid},
  title        = {Process Authentication through Blockchain: Three Case Studies},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {58},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040058},
  doi          = {10.3390/CRYPTOGRAPHY6040058},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/CiampiRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DattaZBS22,
  author       = {Rajesh Datta and
                  Guangwei Zhao and
                  Kanad Basu and
                  Kaveh Shamsi},
  title        = {A Security Analysis of Circuit Clock Obfuscation},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {43},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030043},
  doi          = {10.3390/CRYPTOGRAPHY6030043},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DattaZBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DeeRT22,
  author       = {Timothy Dee and
                  Ian Richardson and
                  Akhilesh Tyagi},
  title        = {Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {14},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020014},
  doi          = {10.3390/CRYPTOGRAPHY6020014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DeeRT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DrzazgaK22,
  author       = {Bartosz Drzazga and
                  Lukasz Krzywiecki},
  title        = {Review of Chosen Isogeny-Based Cryptographic Schemes},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {27},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020027},
  doi          = {10.3390/CRYPTOGRAPHY6020027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DrzazgaK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FauziHR22,
  author       = {Prastudy Fauzi and
                  Martha Norberg Hovd and
                  H{\aa}vard Raddum},
  title        = {On the {IND-CCA1} Security of {FHE} Schemes},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {13},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010013},
  doi          = {10.3390/CRYPTOGRAPHY6010013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FauziHR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FengMZZY22,
  author       = {Haogang Feng and
                  Gaoze Mu and
                  Shida Zhong and
                  Peichang Zhang and
                  Tao Yuan},
  title        = {Benchmark Analysis of {YOLO} Performance on Edge Intelligence Devices},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {16},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020016},
  doi          = {10.3390/CRYPTOGRAPHY6020016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FengMZZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GaoYZL22,
  author       = {Wenhua Gao and
                  Li Yang and
                  Daode Zhang and
                  Xia Liu},
  title        = {Quantum Identity-Based Encryption from the Learning with Errors Problem},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {9},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010009},
  doi          = {10.3390/CRYPTOGRAPHY6010009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GaoYZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GoncalvesM22,
  author       = {Brian Goncalves and
                  Atefeh Mashatan},
  title        = {Tightly Secure {PKE} Combiner in the Quantum Random Oracle Model},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {15},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020015},
  doi          = {10.3390/CRYPTOGRAPHY6020015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GoncalvesM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GueronPS22,
  author       = {Shay Gueron and
                  Edoardo Persichetti and
                  Paolo Santini},
  title        = {Designing a Practical Code-Based Signature Scheme from Zero-Knowledge
                  Proofs with Trusted Setup},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {5},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010005},
  doi          = {10.3390/CRYPTOGRAPHY6010005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GueronPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Ham22,
  author       = {Byoung S. Ham},
  title        = {Network-Compatible Unconditionally Secured Classical Key Distribution
                  via Quantum Superposition-Induced Deterministic Randomness},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010004},
  doi          = {10.3390/CRYPTOGRAPHY6010004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Ham22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HashimSS22,
  author       = {Faiza Hashim and
                  Khaled Shuaib and
                  Farag M. Sallabi},
  title        = {Connected Blockchain Federations for Sharing Electronic Health Records},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {47},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030047},
  doi          = {10.3390/CRYPTOGRAPHY6030047},
  timestamp    = {Sat, 24 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/HashimSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/IbrahimAAA22,
  author       = {Dina Ibrahim and
                  Kareem Ahmed and
                  Mohamed Abdallah and
                  Abdelmgeid A. Ali},
  title        = {A New Chaotic-Based {RGB} Image Encryption Technique Using a Nonlinear
                  Rotational 16 {\texttimes} 16 {DNA} Playfair Matrix},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {28},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020028},
  doi          = {10.3390/CRYPTOGRAPHY6020028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/IbrahimAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JemihinTC22,
  author       = {Zulianie Binti Jemihin and
                  Soo Fun Tan and
                  Gwo Chin Chung},
  title        = {Attribute-Based Encryption in Securing Big Data from Post-Quantum
                  Perspective: {A} Survey},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {40},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030040},
  doi          = {10.3390/CRYPTOGRAPHY6030040},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/JemihinTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KampourakisCKDZ22,
  author       = {Vyron Kampourakis and
                  Efstratios Chatzoglou and
                  Georgios Kambourakis and
                  Apostolos Dolmes and
                  Christos D. Zaroliagis},
  title        = {WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {53},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040053},
  doi          = {10.3390/CRYPTOGRAPHY6040053},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KampourakisCKDZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KharchenkoPIFI22,
  author       = {Vyacheslav Kharchenko and
                  Yuriy Ponochovnyi and
                  Oleg Ivanchenko and
                  Herman Fesenko and
                  Oleg Illiashenko},
  title        = {Combining Markov and Semi-Markov Modelling for Assessing Availability
                  and Cybersecurity of Cloud and IoT Systems},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {44},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030044},
  doi          = {10.3390/CRYPTOGRAPHY6030044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KharchenkoPIFI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Kieu-Do-NguyenP22,
  author       = {Binh Kieu{-}Do{-}Nguyen and
                  Cuong Pham{-}Quoc and
                  Ngoc{-}Thinh Tran and
                  Cong{-}Kha Pham and
                  Trong{-}Thuc Hoang},
  title        = {Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {25},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020025},
  doi          = {10.3390/CRYPTOGRAPHY6020025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Kieu-Do-NguyenP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KimCSBK22,
  author       = {Jongkil Kim and
                  Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek and
                  Intae Kim},
  title        = {Functional Encryption for Pattern Matching with a Hidden String},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {1},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010001},
  doi          = {10.3390/CRYPTOGRAPHY6010001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KimCSBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KlamtiH22,
  author       = {Jean Belo Klamti and
                  M. Anwar Hasan},
  title        = {Post-Quantum Two-Party Adaptor Signature Based on Coding Theory},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {6},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010006},
  doi          = {10.3390/CRYPTOGRAPHY6010006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KlamtiH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KoptyraO22,
  author       = {Katarzyna Koptyra and
                  Marek R. Ogiela},
  title        = {Subliminal Channels in Visual Cryptography},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {46},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030046},
  doi          = {10.3390/CRYPTOGRAPHY6030046},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KoptyraO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KudzinTTI22,
  author       = {Alexander Kudzin and
                  Kentaroh Toyoda and
                  Satoshi Takayama and
                  Atsushi Ishigame},
  title        = {Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {57},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040057},
  doi          = {10.3390/CRYPTOGRAPHY6040057},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KudzinTTI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KumarMSJAR22,
  author       = {Vipin Kumar and
                  Navneet Malik and
                  Jimmy Singla and
                  N. Z. Jhanjhi and
                  Fathi Amsaad and
                  Abdul Razaque},
  title        = {Light Weight Authentication Scheme for Smart Home IoT Devices},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {37},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030037},
  doi          = {10.3390/CRYPTOGRAPHY6030037},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KumarMSJAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LabaoA22,
  author       = {Alfonso B. Labao and
                  Henry N. Adorna},
  title        = {A {CCA-PKE} Secure-Cryptosystem Resilient to Randomness Reset and
                  Secret-Key Leakage},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {2},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010002},
  doi          = {10.3390/CRYPTOGRAPHY6010002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LabaoA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LabaoA22a,
  author       = {Alfonso B. Labao and
                  Henry N. Adorna},
  title        = {Cryptographic Rational Secret Sharing Schemes over General Networks},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {50},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040050},
  doi          = {10.3390/CRYPTOGRAPHY6040050},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LabaoA22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LiagkouNSS22,
  author       = {Vasiliki Liagkou and
                  Panayotis E. Nastou and
                  Paul G. Spirakis and
                  Yannis C. Stamatiou},
  title        = {How Hard Is It to Detect Surveillance? {A} Formal Study of Panopticons
                  and Their Detectability Problem},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {42},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030042},
  doi          = {10.3390/CRYPTOGRAPHY6030042},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LiagkouNSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LongoMMST22,
  author       = {Riccardo Longo and
                  Carla Mascia and
                  Alessio Meneghetti and
                  Giordano Santilli and
                  Giovanni Tognolini},
  title        = {Adaptable Cryptographic Primitives in Blockchains via Smart Contracts},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {32},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030032},
  doi          = {10.3390/CRYPTOGRAPHY6030032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LongoMMST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Martinez-Rodriguez22,
  author       = {Macarena C. Mart{\'{\i}}nez{-}Rodr{\'{\i}}guez and
                  Luis F. Rojas{-}Mu{\~{n}}oz and
                  Eros Camacho{-}Ruiz and
                  Santiago S{\'{a}}nchez{-}Solano and
                  Piedad Brox},
  title        = {Efficient {RO-PUF} for Generation of Identifiers and Keys in Resource-Constrained
                  Embedded Systems},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {51},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040051},
  doi          = {10.3390/CRYPTOGRAPHY6040051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Martinez-Rodriguez22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MihailescuN22,
  author       = {Marius Iulian Mihailescu and
                  Stefania Loredana Nita},
  title        = {A Searchable Encryption Scheme with Biometric Authentication and Authorization
                  for Cloud Environments},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {8},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010008},
  doi          = {10.3390/CRYPTOGRAPHY6010008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MihailescuN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MuthavhineS22,
  author       = {Khumbelo Difference Muthavhine and
                  Mbuyu Sumbwanyambe},
  title        = {Preventing Differential Cryptanalysis Attacks Using a {KDM} Function
                  and the 32-Bit Output S-Boxes on {AES} Algorithm Found on the Internet
                  of Things Devices},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {11},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010011},
  doi          = {10.3390/CRYPTOGRAPHY6010011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MuthavhineS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NelaturuDL22,
  author       = {Keerthi Nelaturu and
                  Han Du and
                  Duc{-}Phong Le},
  title        = {A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future
                  Directions},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {18},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020018},
  doi          = {10.3390/CRYPTOGRAPHY6020018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NelaturuDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NisanciFY22,
  author       = {G{\"{o}}rkem Nisanci and
                  Paul G. Flikkema and
                  Tolga Yal{\c{c}}in},
  title        = {Symmetric Cryptography on {RISC-V:} Performance Evaluation of Standardized
                  Algorithms},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {41},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030041},
  doi          = {10.3390/CRYPTOGRAPHY6030041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NisanciFY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/OwenJPMD22,
  author       = {Donald E. Owen and
                  Jithin Joseph and
                  Jim Plusquellic and
                  Tom J. Mannos and
                  Brian Dziki},
  title        = {Node Monitoring as a Fault Detection Countermeasure against Information
                  Leakage within a {RISC-V} Microprocessor},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {38},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030038},
  doi          = {10.3390/CRYPTOGRAPHY6030038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/OwenJPMD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PatergianakisL22,
  author       = {Antonios Patergianakis and
                  Konstantinos Limniotis},
  title        = {Privacy Issues in Stylometric Methods},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {17},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020017},
  doi          = {10.3390/CRYPTOGRAPHY6020017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PatergianakisL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PereraNHYCS22,
  author       = {Maharage Nisansala Sevwandi Perera and
                  Toru Nakamura and
                  Masayuki Hashimoto and
                  Hiroyuki Yokoyama and
                  Chen{-}Mou Cheng and
                  Kouichi Sakurai},
  title        = {A Survey on Group Signatures and Ring Signatures: Traceability vs.
                  Anonymity},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {3},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010003},
  doi          = {10.3390/CRYPTOGRAPHY6010003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PereraNHYCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PereraNHYCS22a,
  author       = {Maharage Nisansala Sevwandi Perera and
                  Toru Nakamura and
                  Masayuki Hashimoto and
                  Hiroyuki Yokoyama and
                  Chen{-}Mou Cheng and
                  Kouichi Sakurai},
  title        = {Certificate Management Scheme for VANETs Using Blockchain Structure},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {20},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020020},
  doi          = {10.3390/CRYPTOGRAPHY6020020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PereraNHYCS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Plusquellic22,
  author       = {Jim Plusquellic},
  title        = {Shift Register, Reconvergent-Fanout (SiRF) {PUF} Implementation on
                  an {FPGA}},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {59},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040059},
  doi          = {10.3390/CRYPTOGRAPHY6040059},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Plusquellic22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RadulescuC22,
  author       = {Anca Radulescu and
                  Marios O. Choudary},
  title        = {Side-Channel Attacks on Masked Bitsliced Implementations of {AES}},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {31},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030031},
  doi          = {10.3390/CRYPTOGRAPHY6030031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/RadulescuC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RiggsPCBRHG22,
  author       = {Brit Riggs and
                  Michael Partridge and
                  Bertrand Cambou and
                  Ian Burke and
                  Manuel Aguilar Rios and
                  Julie Heynssens and
                  Dina Ghanaimiandoab},
  title        = {Multi-Wavelength Quantum Key Distribution Emulation with Physical
                  Unclonable Function},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {36},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030036},
  doi          = {10.3390/CRYPTOGRAPHY6030036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/RiggsPCBRHG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SenguptaNAKS22,
  author       = {Abhrajit Sengupta and
                  Mohammed Nabeel and
                  Mohammed Ashraf and
                  Johann Knechtel and
                  Ozgur Sinanoglu},
  title        = {A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the
                  {BEOL}},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {22},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020022},
  doi          = {10.3390/CRYPTOGRAPHY6020022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SenguptaNAKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SerranoDSPH22,
  author       = {Ronaldo Serrano and
                  Ckristian Duran and
                  Marco Sarmiento and
                  Cong{-}Kha Pham and
                  Trong{-}Thuc Hoang},
  title        = {ChaCha20-Poly1305 Authenticated Encryption with Additional Data for
                  Transport Layer Security 1.3},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {30},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020030},
  doi          = {10.3390/CRYPTOGRAPHY6020030},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SerranoDSPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/StockPPH22,
  author       = {Frederick Stock and
                  Yesem Kurt Peker and
                  Alfredo J. Perez and
                  Jarel Hearst},
  title        = {Physical Visitor Access Control and Authentication Using Blockchain,
                  Smart Contracts and Internet of Things},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {65},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040065},
  doi          = {10.3390/CRYPTOGRAPHY6040065},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/StockPPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Sujatanagarjuna22,
  author       = {Anant Sujatanagarjuna and
                  Arne Bochem and
                  Benjamin Leiding},
  title        = {Formalizing and Safeguarding Blockchain-Based BlockVoke Protocol as
                  an {ACME} Extension for Fast Certificate Revocation},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {63},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040063},
  doi          = {10.3390/CRYPTOGRAPHY6040063},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Sujatanagarjuna22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TalakiSNH22,
  author       = {Ezinam Bertrand Talaki and
                  Olivier Savry and
                  Mathieu Bouvier Des Noes and
                  David H{\'{e}}ly},
  title        = {A Memory Hierarchy Protected against Side-Channel Attacks},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {19},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020019},
  doi          = {10.3390/CRYPTOGRAPHY6020019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TalakiSNH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TsantikidouS22,
  author       = {Kyriaki Tsantikidou and
                  Nicolas Sklavos},
  title        = {Hardware Limitations of Lightweight Cryptographic Designs for IoT
                  in Healthcare},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {45},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030045},
  doi          = {10.3390/CRYPTOGRAPHY6030045},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TsantikidouS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/VeugenKM22,
  author       = {Thijs Veugen and
                  Bart Kamphorst and
                  Michiel Marcus},
  title        = {Privacy-Preserving Contrastive Explanations with Local Foil Trees},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {54},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040054},
  doi          = {10.3390/CRYPTOGRAPHY6040054},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/VeugenKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/WangH22,
  author       = {Chia{-}Hui Wang and
                  Chih{-}Hao Hsu},
  title        = {Blockchain of Resource-Efficient Anonymity Protection with Watermarking
                  for IoT Big Data Market},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {49},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040049},
  doi          = {10.3390/CRYPTOGRAPHY6040049},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/WangH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/WibawaCSK22,
  author       = {Febrianti Wibawa and
                  Ferhat {\"{O}}zg{\"{u}}r {\c{C}}atak and
                  Salih Sarp and
                  Murat Kuzlu},
  title        = {BFV-Based Homomorphic Encryption for Privacy-Preserving {CNN} Models},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {34},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030034},
  doi          = {10.3390/CRYPTOGRAPHY6030034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/WibawaCSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/X22,
  title        = {Acknowledgment to Reviewers of Cryptography in 2021},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {7},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6010007},
  doi          = {10.3390/CRYPTOGRAPHY6010007},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/X22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/YaoMZ22,
  author       = {Jiewen Yao and
                  Krystian Matusiewicz and
                  Vincent Zimmer},
  title        = {Post Quantum Design in {SPDM} for Device Authentication and Key Establishment},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {48},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040048},
  doi          = {10.3390/CRYPTOGRAPHY6040048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/YaoMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZamirN22,
  author       = {Linir Zamir and
                  Mehrdad Nojoumian},
  title        = {Localized State-Change Consensus in Immense and Highly Dynamic Environments},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {23},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6020023},
  doi          = {10.3390/CRYPTOGRAPHY6020023},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZamirN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZengTX22,
  author       = {Yao Zeng and
                  Yuxi Tang and
                  Luping Xiang},
  title        = {Physical Layer Security Design for Polar Code Construction},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {35},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6030035},
  doi          = {10.3390/CRYPTOGRAPHY6030035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZengTX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZhaoS22,
  author       = {Guangwei Zhao and
                  Kaveh Shamsi},
  title        = {Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based
                  Circuit Deobfuscation},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {60},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040060},
  doi          = {10.3390/CRYPTOGRAPHY6040060},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZhaoS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZhouZWC22,
  author       = {Quan Zhou and
                  Zhikang Zeng and
                  Kemeng Wang and
                  Menglong Chen},
  title        = {Privacy Protection Scheme for the Internet of Vehicles Based on Private
                  Set Intersection},
  journal      = {Cryptogr.},
  volume       = {6},
  number       = {4},
  pages        = {64},
  year         = {2022},
  url          = {https://doi.org/10.3390/cryptography6040064},
  doi          = {10.3390/CRYPTOGRAPHY6040064},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZhouZWC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AerabiHBPF21,
  author       = {Ehsan Aerabi and
                  David H{\'{e}}ly and
                  Cyril Bresch and
                  Athanasios Papadimitriou and
                  Mahdi Fazeli},
  title        = {{CONFISCA:} An SIMD-Based Concurrent {FI} and {SCA} Countermeasure
                  with Switchable Performance and Security Modes},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {2},
  pages        = {13},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5020013},
  doi          = {10.3390/CRYPTOGRAPHY5020013},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AerabiHBPF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlabdullahBW21,
  author       = {Bayan Ibrahimm Alabdullah and
                  Natalia Beloff and
                  Martin White},
  title        = {{E-ART:} {A} New Encryption Algorithm Based on the Reflection of Binary
                  Search Tree},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {4},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010004},
  doi          = {10.3390/CRYPTOGRAPHY5010004},
  timestamp    = {Wed, 06 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlabdullahBW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlzakariV21,
  author       = {Sarah A. Alzakari and
                  Poorvi L. Vora},
  title        = {Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {1},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010001},
  doi          = {10.3390/CRYPTOGRAPHY5010001},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlzakariV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AmarasingheBM21,
  author       = {Niluka Amarasinghe and
                  Xavier Boyen and
                  Matthew McKague},
  title        = {The Cryptographic Complexity of Anonymous Coins: {A} Systematic Exploration},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {10},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010010},
  doi          = {10.3390/CRYPTOGRAPHY5010010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AmarasingheBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AnagrehLV21,
  author       = {Mohammad Anagreh and
                  Peeter Laud and
                  Eero Vainikko},
  title        = {Parallel Privacy-Preserving Shortest Path Algorithms},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {27},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040027},
  doi          = {10.3390/CRYPTOGRAPHY5040027},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/AnagrehLV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BalamuruganSGR21,
  author       = {Chithralekha Balamurugan and
                  Kalpana Singh and
                  Ganeshvani Ganesan and
                  Muttukrishnan Rajarajan},
  title        = {Post-Quantum and Code-Based Cryptography - Some Prospective Research
                  Directions},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {38},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040038},
  doi          = {10.3390/CRYPTOGRAPHY5040038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BalamuruganSGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BelliziaSS21,
  author       = {Davide Bellizia and
                  Riccardo Della Sala and
                  Giuseppe Scotti},
  title        = {{SC-DDPL} as a Countermeasure against Static Power Side-Channel Attacks},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {16},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030016},
  doi          = {10.3390/CRYPTOGRAPHY5030016},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BelliziaSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BoyenHMS21,
  author       = {Xavier Boyen and
                  Udyani Herath and
                  Matthew McKague and
                  Douglas Stebila},
  title        = {Associative Blockchain for Decentralized {PKI} Transparency},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {2},
  pages        = {14},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5020014},
  doi          = {10.3390/CRYPTOGRAPHY5020014},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BoyenHMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BudroniGJMW21,
  author       = {Alessandro Budroni and
                  Qian Guo and
                  Thomas Johansson and
                  Erik M{\aa}rtensson and
                  Paul Stankovski Wagner},
  title        = {Improvements on Making {BKW} Practical for Solving {LWE}},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {31},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040031},
  doi          = {10.3390/CRYPTOGRAPHY5040031},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BudroniGJMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CambouTAGJP21,
  author       = {Bertrand Cambou and
                  Donald Telesca and
                  Sareh Assiri and
                  Michael Garrett and
                  Saloni Jain and
                  Michael Partridge},
  title        = {TRNGs from Pre-Formed ReRAM Arrays},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {8},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010008},
  doi          = {10.3390/CRYPTOGRAPHY5010008},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CambouTAGJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChenMG21,
  author       = {Yu{-}Cheng Chen and
                  Vincent John Mooney and
                  Santiago Grijalva},
  title        = {Grid Cyber-Security Strategy in an Attacker-Defender Model},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {2},
  pages        = {12},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5020012},
  doi          = {10.3390/CRYPTOGRAPHY5020012},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChenMG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChongS21,
  author       = {Bang Yuan Chong and
                  Iftekhar Salam},
  title        = {Investigating Deep Learning Approaches on the Security Analysis of
                  Cryptographic Algorithms},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {30},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040030},
  doi          = {10.3390/CRYPTOGRAPHY5040030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChongS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CojocaruCKW21,
  author       = {Alexandru Cojocaru and
                  L{\'{e}}o Colisson and
                  Elham Kashefi and
                  Petros Wallden},
  title        = {On the Possibility of Classical Client Blind Quantum Computing},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {3},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010003},
  doi          = {10.3390/CRYPTOGRAPHY5010003},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CojocaruCKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DannerK21,
  author       = {Julian Danner and
                  Martin Kreuzer},
  title        = {A Fault Attack on the Family of Enocoro Stream Ciphers},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {26},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040026},
  doi          = {10.3390/CRYPTOGRAPHY5040026},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DannerK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/El-AttarEA21,
  author       = {Noha Ezzat El{-}Attar and
                  Doaa S. El{-}Morshedy and
                  Wael A. Awad},
  title        = {A New Hybrid Automated Security Framework to Cloud Storage System},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {37},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040037},
  doi          = {10.3390/CRYPTOGRAPHY5040037},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/El-AttarEA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FreudenbergerT21,
  author       = {J{\"{u}}rgen Freudenberger and
                  Johann{-}Philipp Thiers},
  title        = {A New Class of Q-Ary Codes for the McEliece Cryptosystem},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {11},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010011},
  doi          = {10.3390/CRYPTOGRAPHY5010011},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FreudenbergerT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GordonEGYKT21,
  author       = {Holden Gordon and
                  Jack Edmonds and
                  Soroor Ghandali and
                  Wei Yan and
                  Nima Karimian and
                  Fatemeh Tehranipoor},
  title        = {Flash-Based Security Primitives: Evolution, Challenges and Future
                  Directions},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {7},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010007},
  doi          = {10.3390/CRYPTOGRAPHY5010007},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GordonEGYKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GrycelS21,
  author       = {Jacob T. Grycel and
                  Patrick Schaumont},
  title        = {SimpliFI: Hardware Simulation of Embedded Software Fault Attacks},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {2},
  pages        = {15},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5020015},
  doi          = {10.3390/CRYPTOGRAPHY5020015},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GrycelS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GuiBHS21,
  author       = {Yutian Gui and
                  Chaitanya Bhure and
                  Marcus Hughes and
                  Fareena Saqib},
  title        = {A Delay-Based Machine Learning Model for {DMA} Attack Mitigation},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {18},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030018},
  doi          = {10.3390/CRYPTOGRAPHY5030018},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/GuiBHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HamadaqaMAB21,
  author       = {Emad Hamadaqa and
                  Saleh Mulhem and
                  Wael Adi and
                  Mladen Berekovic},
  title        = {Contemporary Physical Clone-Resistant Identity for IoTs and Emerging
                  Technologies},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {32},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040032},
  doi          = {10.3390/CRYPTOGRAPHY5040032},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HamadaqaMAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/IoannidouS21,
  author       = {Irene Ioannidou and
                  Nicolas Sklavos},
  title        = {On General Data Protection Regulation Vulnerabilities and Privacy
                  Issues, for Wearable Devices and Fitness Tracking Applications},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {29},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040029},
  doi          = {10.3390/CRYPTOGRAPHY5040029},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/IoannidouS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KleinHL21,
  author       = {Netanel Klein and
                  Eyal Harel and
                  Itamar Levi},
  title        = {The Cost of a True Random Bit - On the Electronic Cost Gain of {ASIC}
                  Time-Domain-Based TRNGs},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {25},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030025},
  doi          = {10.3390/CRYPTOGRAPHY5030025},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/KleinHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LaurP21,
  author       = {Sven Laur and
                  Pille Pullonen{-}Raudvere},
  title        = {Foundations of Programmable Secure Computation},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {22},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030022},
  doi          = {10.3390/CRYPTOGRAPHY5030022},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/LaurP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Limniotis21,
  author       = {Konstantinos Limniotis},
  title        = {Cryptography as the Means to Protect Fundamental Human Rights},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {34},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040034},
  doi          = {10.3390/CRYPTOGRAPHY5040034},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Limniotis21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MohammedAB21,
  author       = {Kabiru Mohammed and
                  Aladdin Ayesh and
                  Eerke A. Boiten},
  title        = {Complementing Privacy and Utility Trade-Off with Self-Organising Maps},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {20},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030020},
  doi          = {10.3390/CRYPTOGRAPHY5030020},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/MohammedAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/OnoM21,
  author       = {Hibiki Ono and
                  Yoshifumi Manabe},
  title        = {Minimum Round Card-Based Cryptographic Protocols Using Private Operations},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {17},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030017},
  doi          = {10.3390/CRYPTOGRAPHY5030017},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/OnoM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/OstrakRSLK21,
  author       = {Andre Ostrak and
                  Jaak Randmets and
                  Ville Sokk and
                  Sven Laur and
                  Liina Kamm},
  title        = {Implementing Privacy-Preserving Genotype Analysis with Consideration
                  for Population Stratification},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {21},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030021},
  doi          = {10.3390/CRYPTOGRAPHY5030021},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/OstrakRSLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RomanoS21,
  author       = {Diego Romano and
                  Giovanni Schmid},
  title        = {Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger
                  Technology},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {36},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040036},
  doi          = {10.3390/CRYPTOGRAPHY5040036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/RomanoS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SafiehF21,
  author       = {Malek Safieh and
                  J{\"{u}}rgen Freudenberger},
  title        = {Montgomery Reduction for Gaussian Integers},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {6},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010006},
  doi          = {10.3390/CRYPTOGRAPHY5010006},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SafiehF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SahaK21,
  author       = {Tushar Kanti Saha and
                  Takeshi Koshiba},
  title        = {Efficient Private Conjunctive Query Protocol Over Encrypted Data},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {2},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010002},
  doi          = {10.3390/CRYPTOGRAPHY5010002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SahaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SalaBS21,
  author       = {Riccardo Della Sala and
                  Davide Bellizia and
                  Giuseppe Scotti},
  title        = {A Novel Ultra-Compact {FPGA} {PUF:} The {DD-PUF}},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {23},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030023},
  doi          = {10.3390/CRYPTOGRAPHY5030023},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SalaBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SalomonWL21,
  author       = {Dor Salomon and
                  Amir Weiss and
                  Itamar Levi},
  title        = {Improved Filtering Techniques for Single- and Multi-Trace Side-Channel
                  Analysis},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {24},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030024},
  doi          = {10.3390/CRYPTOGRAPHY5030024},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SalomonWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SathiaseelanPTA21,
  author       = {Mukhil Azhagan Mallaiyan Sathiaseelan and
                  Olivia P. Paradis and
                  Shayan Taheri and
                  Navid Asadizanjani},
  title        = {Why Is Deep Learning Challenging for Printed Circuit Board {(PCB)}
                  Component Recognition and How Can We Address It?},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {9},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010009},
  doi          = {10.3390/CRYPTOGRAPHY5010009},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SathiaseelanPTA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SayadiGMLCRH21,
  author       = {Hossein Sayadi and
                  Yifeng Gao and
                  Hosein Mohammadi Makrani and
                  Jessica Lin and
                  Paulo Cesar G. da Costa and
                  Setareh Rafatirad and
                  Houman Homayoun},
  title        = {Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection:
                  {A} Lightweight, yet Effective Time Series CNN-Based Approach},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {28},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040028},
  doi          = {10.3390/CRYPTOGRAPHY5040028},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SayadiGMLCRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Seo21,
  author       = {Minhye Seo},
  title        = {Fair and Secure Multi-Party Computation with Cheater Detection},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {3},
  pages        = {19},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5030019},
  doi          = {10.3390/CRYPTOGRAPHY5030019},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Seo21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SuvidhaRKL21,
  author       = {K. S. Suvidha and
                  Jothi Rangasamy and
                  Shyam S. Kamath and
                  Cheng{-}Chi Lee},
  title        = {{ES-HAS:} ECC-Based Secure Handover Authentication Scheme for Roaming
                  Mobile User in Global Mobility Networks},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {35},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040035},
  doi          = {10.3390/CRYPTOGRAPHY5040035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SuvidhaRKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ThiersF21,
  author       = {Johann{-}Philipp Thiers and
                  J{\"{u}}rgen Freudenberger},
  title        = {Generalized Concatenated Codes over Gaussian and Eisenstein Integers
                  for Code-Based Cryptography},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {4},
  pages        = {33},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5040033},
  doi          = {10.3390/CRYPTOGRAPHY5040033},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/ThiersF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/X21,
  title        = {Acknowledgment to Reviewers of Cryptography in 2020},
  journal      = {Cryptogr.},
  volume       = {5},
  number       = {1},
  pages        = {5},
  year         = {2021},
  url          = {https://doi.org/10.3390/cryptography5010005},
  doi          = {10.3390/CRYPTOGRAPHY5010005},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Abidin20,
  author       = {Aysajan Abidin},
  title        = {On Detecting Relay Attacks on {RFID} Systems Using Qubits},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {14},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4020014},
  doi          = {10.3390/CRYPTOGRAPHY4020014},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Abidin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlagicJOP20,
  author       = {Gorjan Alagic and
                  Stacey Jeffery and
                  Maris Ozols and
                  Alexander Poremba},
  title        = {On Quantum Chosen-Ciphertext Attacks and Learning with Errors},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {10},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010010},
  doi          = {10.3390/CRYPTOGRAPHY4010010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlagicJOP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlmukhlifiV20,
  author       = {Reham Almukhlifi and
                  Poorvi L. Vora},
  title        = {Linear Cryptanalysis of Reduced-Round Simon Using Super Rounds},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {9},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010009},
  doi          = {10.3390/CRYPTOGRAPHY4010009},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlmukhlifiV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BezzateevDO20,
  author       = {Sergey Bezzateev and
                  Vadim Davydov and
                  Aleksandr Ometov},
  title        = {On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {34},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040034},
  doi          = {10.3390/CRYPTOGRAPHY4040034},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BezzateevDO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BowBSCPRCP20,
  author       = {Ivan Bow and
                  Nahome Bete and
                  Fareena Saqib and
                  Wenjie Che and
                  Chintan Patel and
                  Ryan W. Robucci and
                  Calvin Chan and
                  Jim Plusquellic},
  title        = {Side-Channel Power Resistance for Encryption Algorithms Using Implementation
                  Diversity},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {13},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4020013},
  doi          = {10.3390/CRYPTOGRAPHY4020013},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BowBSCPRCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BreuerL20,
  author       = {Rinat Breuer and
                  Itamar Levi},
  title        = {How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security
                  Evaluation and its Cost},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {36},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040036},
  doi          = {10.3390/CRYPTOGRAPHY4040036},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/BreuerL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CambouGHJPBBGTN20,
  author       = {Bertrand Cambou and
                  Michael Gowanlock and
                  Julie Heynssens and
                  Saloni Jain and
                  Christopher Robert Philabaum and
                  Duane Booher and
                  Ian Burke and
                  Jack Garrard and
                  Donald Telesca and
                  Laurent Njilla},
  title        = {Securing Additive Manufacturing with Blockchains and Distributed Physically
                  Unclonable Functions},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {17},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4020017},
  doi          = {10.3390/CRYPTOGRAPHY4020017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CambouGHJPBBGTN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CockellH20,
  author       = {Robert Cockell and
                  Basel Halak},
  title        = {On the Design and Analysis of a Biometric Authentication System Using
                  Keystroke Dynamics},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {12},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4020012},
  doi          = {10.3390/CRYPTOGRAPHY4020012},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CockellH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CowperST20,
  author       = {Noah Cowper and
                  Harry C. Shaw and
                  David R. Thayer},
  title        = {Chaotic Quantum Key Distribution},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {3},
  pages        = {24},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4030024},
  doi          = {10.3390/CRYPTOGRAPHY4030024},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/CowperST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DasS20,
  author       = {Debayan Das and
                  Shreyas Sen},
  title        = {Electromagnetic and Power Side-Channel Analysis: Advanced Attacks
                  and Low-Overhead Generic Countermeasures through White-Box Approach},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {30},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040030},
  doi          = {10.3390/CRYPTOGRAPHY4040030},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DasS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Dwivedi20,
  author       = {Ashutosh Dhar Dwivedi},
  title        = {Security Analysis of Lightweight IoT Cipher: Chaskey},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {3},
  pages        = {22},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4030022},
  doi          = {10.3390/CRYPTOGRAPHY4030022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Dwivedi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/EvsutinD20,
  author       = {Oleg Evsutin and
                  Kristina Dzhanashia},
  title        = {Algorithm of Information Embedding into Digital Images Based on the
                  Chinese Remainder Theorem for Data Security},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {35},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040035},
  doi          = {10.3390/CRYPTOGRAPHY4040035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/EvsutinD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GuilleyKPSST20,
  author       = {Sylvain Guilley and
                  Khaled Karray and
                  Thomas Perianin and
                  Ritu Ranjan Shrivastwa and
                  Youssef Souissi and
                  Sofiane Takarabt},
  title        = {Side-Channel Evaluation Methodology on Software},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {27},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040027},
  doi          = {10.3390/CRYPTOGRAPHY4040027},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GuilleyKPSST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HamadaqaMA20,
  author       = {Emad Hamadaqa and
                  Ayoub Mars and
                  Wael Adi},
  title        = {Physical Security for Fleet Management Systems},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010001},
  doi          = {10.3390/CRYPTOGRAPHY4010001},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HamadaqaMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HeoKYPH20,
  author       = {Donghoe Heo and
                  Suhri Kim and
                  Kisoon Yoon and
                  Young{-}Ho Park and
                  Seokhie Hong},
  title        = {Optimized {CSIDH} Implementation Using a 2-Torsion Point},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {3},
  pages        = {20},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4030020},
  doi          = {10.3390/CRYPTOGRAPHY4030020},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HeoKYPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Jarpe20,
  author       = {Eric J{\"{a}}rpe},
  title        = {An Alternative Diffie-Hellman Protocol},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {5},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010005},
  doi          = {10.3390/CRYPTOGRAPHY4010005},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Jarpe20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JimboIR20,
  author       = {Koki Jimbo and
                  Satoshi Iriyama and
                  Massimo Regoli},
  title        = {Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {3},
  pages        = {21},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4030021},
  doi          = {10.3390/CRYPTOGRAPHY4030021},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/JimboIR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KiharaI20,
  author       = {Maki Kihara and
                  Satoshi Iriyama},
  title        = {Security and Performance of Single Sign-on Based on One-Time Pad Algorithm},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {16},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4020016},
  doi          = {10.3390/CRYPTOGRAPHY4020016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KiharaI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LiangBM20,
  author       = {Bei Liang and
                  Gustavo Banegas and
                  Aikaterini Mitrokotsa},
  title        = {Statically Aggregate Verifiable Random Functions and Application to
                  E-Lottery},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {37},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040037},
  doi          = {10.3390/CRYPTOGRAPHY4040037},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LiangBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MahmodG20,
  author       = {Md Jubayer al Mahmod and
                  Ujjwal Guin},
  title        = {A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {8},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010008},
  doi          = {10.3390/CRYPTOGRAPHY4010008},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MahmodG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MarkhamK20,
  author       = {Damian Markham and
                  Alexandra Krause},
  title        = {A Simple Protocol for Certifying Graph States and Applications in
                  Quantum Networks},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {3},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010003},
  doi          = {10.3390/CRYPTOGRAPHY4010003},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MarkhamK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MartinP20,
  author       = {Mitchell T. Martin and
                  Jim Plusquellic},
  title        = {NotchPUF: Printed Circuit Board {PUF} Based on Microstrip Notch Filter},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {11},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4020011},
  doi          = {10.3390/CRYPTOGRAPHY4020011},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MartinP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MazzarellaLLJGM20,
  author       = {Luca Mazzarella and
                  Christopher John Lowe and
                  David Lowndes and
                  Siddarth Koduru Joshi and
                  Steve Greenland and
                  Doug McNeil and
                  Cassandra Mercury and
                  Malcolm Macdonald and
                  John G. Rarity and
                  Daniel Kuan Li Oi},
  title        = {{QUARC:} Quantum Research Cubesat - {A} Constellation for Quantum
                  Communication},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {7},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010007},
  doi          = {10.3390/CRYPTOGRAPHY4010007},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MazzarellaLLJGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MulhemMA20,
  author       = {Saleh Mulhem and
                  Ayoub Mars and
                  Wael Adi},
  title        = {Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically
                  Clone-Resistant Identities},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {6},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010006},
  doi          = {10.3390/CRYPTOGRAPHY4010006},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MulhemMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NijsseL20,
  author       = {Jeff Nijsse and
                  Alan T. Litchfield},
  title        = {A Taxonomy of Blockchain Consensus Methods},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {32},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040032},
  doi          = {10.3390/CRYPTOGRAPHY4040032},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NijsseL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NikolopoulosF20,
  author       = {Georgios M. Nikolopoulos and
                  Marc Fischlin},
  title        = {Information-Theoretically Secure Data Origin Authentication with Quantum
                  and Classical Resources},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {31},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040031},
  doi          = {10.3390/CRYPTOGRAPHY4040031},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NikolopoulosF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PereraK20,
  author       = {Maharage Nisansala Sevwandi Perera and
                  Takeshi Koshiba},
  title        = {Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local
                  Revocation},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {33},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040033},
  doi          = {10.3390/CRYPTOGRAPHY4040033},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PereraK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RandolphD20,
  author       = {Mark Randolph and
                  William Diehl},
  title        = {Power Side-Channel Attack Analysis: {A} Review of 20 Years of Study
                  for the Layman},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {15},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4020015},
  doi          = {10.3390/CRYPTOGRAPHY4020015},
  timestamp    = {Tue, 07 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/RandolphD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SamanthulaKDK20,
  author       = {Bharath K. Samanthula and
                  Divya Karthikeyan and
                  Boxiang Dong and
                  K. Anitha Kumari},
  title        = {{ESPADE:} An Efficient and Semantically Secure Shortest Path Discovery
                  for Outsourced Location-Based Services},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {29},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040029},
  doi          = {10.3390/CRYPTOGRAPHY4040029},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SamanthulaKDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SauerA20,
  author       = {Alexander Sauer and
                  Gernot Alber},
  title        = {Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities
                  Using Semidefinite Programming},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {2},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010002},
  doi          = {10.3390/CRYPTOGRAPHY4010002},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SauerA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SiddiquiGS20,
  author       = {Ali Shuja Siddiqui and
                  Yutian Gui and
                  Fareena Saqib},
  title        = {Secure Boot for Reconfigurable Architectures},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {26},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040026},
  doi          = {10.3390/CRYPTOGRAPHY4040026},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/SiddiquiGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Sugawara20,
  author       = {Takeshi Sugawara},
  title        = {Hardware Performance Evaluation of Authenticated Encryption {SAEAES}
                  with Threshold Implementation},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {3},
  pages        = {23},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4030023},
  doi          = {10.3390/CRYPTOGRAPHY4030023},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Sugawara20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TahaHSVVAD20,
  author       = {Mohammed Abu Taha and
                  Wassim Hamidouche and
                  Naty Sidaty and
                  Marko Viitanen and
                  Jarno Vanne and
                  Safwan El Assad and
                  Olivier D{\'{e}}forges},
  title        = {Privacy Protection in Real Time {HEVC} Standard Using Chaotic System},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {18},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4020018},
  doi          = {10.3390/CRYPTOGRAPHY4020018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TahaHSVVAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TayachiMANPB20,
  author       = {Mayssa Tayachi and
                  Saleh Mulhem and
                  Wael Adi and
                  Laurent Nana and
                  Anca Pascu and
                  Faouzi Benzarti},
  title        = {Tamper and Clone-Resistant Authentication Scheme for Medical Image
                  Systems},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {3},
  pages        = {19},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4030019},
  doi          = {10.3390/CRYPTOGRAPHY4030019},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/TayachiMANPB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TsaloliBM20,
  author       = {Georgia Tsaloli and
                  Gustavo Banegas and
                  Aikaterini Mitrokotsa},
  title        = {Practical and Provably Secure Distributed Aggregation: Verifiable
                  Additive Homomorphic Secret Sharing},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {3},
  pages        = {25},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4030025},
  doi          = {10.3390/CRYPTOGRAPHY4030025},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TsaloliBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/X20,
  title        = {Acknowledgement to Reviewers of Cryptography in 2019},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {4},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4010004},
  doi          = {10.3390/CRYPTOGRAPHY4010004},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZhouZW20,
  author       = {Yunhong Zhou and
                  Shihui Zheng and
                  Licheng Wang},
  title        = {Privacy-Preserving and Efficient Public Key Encryption with Keyword
                  Search Based on {CP-ABE} in Cloud},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {28},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040028},
  doi          = {10.3390/CRYPTOGRAPHY4040028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZhouZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AccardiIJR19,
  author       = {Luigi Accardi and
                  Satoshi Iriyama and
                  Koki Jimbo and
                  Massimo Regoli},
  title        = {A New Class of Strongly Asymmetric {PKA} Algorithms: {SAA-5}},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {9},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010009},
  doi          = {10.3390/CRYPTOGRAPHY3010009},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AccardiIJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AriffinAYA19,
  author       = {Muhammad Rezal Kamel Ariffin and
                  Saidu Isah Abubakar and
                  Faridah Yunos and
                  Muhammad Asyraf Asbullah},
  title        = {New Cryptanalytic Attack on {RSA} Modulus \emph{N} = \emph{pq} Using
                  Small Prime Difference Method},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {2},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010002},
  doi          = {10.3390/CRYPTOGRAPHY3010002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AriffinAYA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CalhounMHSCP19,
  author       = {Jeff Calhoun and
                  Cyrus Minwalla and
                  Charles Helmich and
                  Fareena Saqib and
                  Wenjie Che and
                  Jim Plusquellic},
  title        = {Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol
                  (PUF-Cash)},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {18},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030018},
  doi          = {10.3390/CRYPTOGRAPHY3030018},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CalhounMHSCP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CampagnaG19,
  author       = {Matthew Campagna and
                  Shay Gueron},
  title        = {Key Management Systems at the Cloud Scale},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {23},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030023},
  doi          = {10.3390/CRYPTOGRAPHY3030023},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CampagnaG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChingY19,
  author       = {Sally Lin Pei Ching and
                  Faridah Yunos},
  title        = {Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {15},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3020015},
  doi          = {10.3390/CRYPTOGRAPHY3020015},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChingY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Chung0LZ19,
  author       = {Kai{-}Min Chung and
                  Marios Georgiou and
                  Ching{-}Yi Lai and
                  Vassilis Zikas},
  title        = {Cryptography with Disposable Backdoors},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {22},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030022},
  doi          = {10.3390/CRYPTOGRAPHY3030022},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Chung0LZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CoyleKH19,
  author       = {Brian Coyle and
                  Elham Kashefi and
                  Matty J. Hoban},
  title        = {Certified Randomness From Steering Using Sequential Measurements},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {27},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3040027},
  doi          = {10.3390/CRYPTOGRAPHY3040027},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CoyleKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Dehnavi19,
  author       = {Seyed Mojtaba Dehnavi},
  title        = {Further Observations on {SIMON} and {SPECK} Block Cipher Families},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {1},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010001},
  doi          = {10.3390/CRYPTOGRAPHY3010001},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Dehnavi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DwivediDSS19,
  author       = {Ashutosh Dhar Dwivedi and
                  Shalini Dhar and
                  Gautam Srivastava and
                  Rajani Singh},
  title        = {Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {4},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010004},
  doi          = {10.3390/CRYPTOGRAPHY3010004},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/DwivediDSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FladungNAF19,
  author       = {Lukas Fladung and
                  Georgios M. Nikolopoulos and
                  Gernot Alber and
                  Marc Fischlin},
  title        = {Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum
                  Authentication Protocol with Physical Unclonable Keys},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {25},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3040025},
  doi          = {10.3390/CRYPTOGRAPHY3040025},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FladungNAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HaiderD19,
  author       = {Syed Kamran Haider and
                  Marten van Dijk},
  title        = {Flat {ORAM:} {A} Simplified Write-Only Oblivious {RAM} Construction
                  for Secure Processors},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {10},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010010},
  doi          = {10.3390/CRYPTOGRAPHY3010010},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HaiderD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JoshiB19,
  author       = {Karuna Pande Joshi and
                  Agniva Banerjee},
  title        = {Automating Privacy Compliance Using Policy Integrated Blockchain},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {7},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010007},
  doi          = {10.3390/CRYPTOGRAPHY3010007},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/JoshiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KiharaI19,
  author       = {Maki Kihara and
                  Satoshi Iriyama},
  title        = {New Authentication Algorithm Based on Verifiable Encryption with Digital
                  Identity},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {19},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030019},
  doi          = {10.3390/CRYPTOGRAPHY3030019},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KiharaI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Kumar19,
  author       = {Niraj Kumar},
  title        = {Practically Feasible Robust Quantum Money with Classical Verification},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {26},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3040026},
  doi          = {10.3390/CRYPTOGRAPHY3040026},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Kumar19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Luyen19,
  author       = {Le Van Luyen},
  title        = {An Improved Identity-Based Multivariate Signature Scheme Based on
                  Rainbow},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {8},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010008},
  doi          = {10.3390/CRYPTOGRAPHY3010008},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Luyen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MarsA19,
  author       = {Ayoub Mars and
                  Wael Adi},
  title        = {New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {11},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3020011},
  doi          = {10.3390/CRYPTOGRAPHY3020011},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MarsA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Mehrabi19,
  author       = {Mohamad Ali Mehrabi},
  title        = {Improved Sum of Residues Modular Multiplication Algorithm},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {14},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3020014},
  doi          = {10.3390/CRYPTOGRAPHY3020014},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Mehrabi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MohammedY19,
  author       = {Alzahraa J. Mohammed and
                  Ali A. Yassin},
  title        = {Efficient and Flexible Multi-Factor Authentication Protocol Based
                  on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile
                  Device},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {24},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030024},
  doi          = {10.3390/CRYPTOGRAPHY3030024},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MohammedY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/MulhemA19,
  author       = {Saleh Mulhem and
                  Wael Adi},
  title        = {New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant
                  {FPGA} Devices},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {28},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3040028},
  doi          = {10.3390/CRYPTOGRAPHY3040028},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/MulhemA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NaseerSSH19,
  author       = {Yasir Naseer and
                  Tariq Shah and
                  Dawood Shah and
                  Sadam Hussain},
  title        = {A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {6},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010006},
  doi          = {10.3390/CRYPTOGRAPHY3010006},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NaseerSSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Office19,
  title        = {Acknowledgement to Reviewers of \emph{Cryptography} in 2018},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {5},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010005},
  doi          = {10.3390/CRYPTOGRAPHY3010005},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Office19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PhadikarJM19,
  author       = {Amit Phadikar and
                  Poulami Jana and
                  Himadri S. Mandal},
  title        = {Reversible Data Hiding for {DICOM} Image Using Lifting and Companding},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {21},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030021},
  doi          = {10.3390/CRYPTOGRAPHY3030021},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PhadikarJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/QuadirC19,
  author       = {Md Shahed Enamul Quadir and
                  John A. Chandy},
  title        = {Key Generation for Hardware Obfuscation Using Strong PUFs},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {17},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030017},
  doi          = {10.3390/CRYPTOGRAPHY3030017},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/QuadirC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SeneCN19,
  author       = {Ibou Sene and
                  Abdoul Aziz Ciss and
                  Oumar Niang},
  title        = {{I2PA:} An Efficient {ABC} for IoT},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {16},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3020016},
  doi          = {10.3390/CRYPTOGRAPHY3020016},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SeneCN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ShahQ19,
  author       = {Tariq Shah and
                  Ayesha Qureshi},
  title        = {S-Box on Subgroup of Galois Field},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {13},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3020013},
  doi          = {10.3390/CRYPTOGRAPHY3020013},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ShahQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SiyalJZAKS19,
  author       = {Asad Ali Siyal and
                  Aisha Zahid Junejo and
                  Muhammad Zawish and
                  Kainat Ahmed and
                  Aiman Khalil and
                  Georgia Soursou},
  title        = {Applications of Blockchain Technology in Medicine and Healthcare:
                  Challenges and Future Perspectives},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {3},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3010003},
  doi          = {10.3390/CRYPTOGRAPHY3010003},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SiyalJZAKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/TiwariKAM19,
  author       = {Bhupendra Nath Tiwari and
                  Jude Kibinde Kuipo and
                  Joshua Muyiwa Adeegbe and
                  Ninoslav Marina},
  title        = {Optimized {AKS} Primality Testing: {A} Fluctuation Theory Perspective},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {12},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3020012},
  doi          = {10.3390/CRYPTOGRAPHY3020012},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/TiwariKAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/VenkatramanO19,
  author       = {Sitalakshmi Venkatraman and
                  Anthony Overmars},
  title        = {New Method of Prime Factorisation-Based Attacks on {RSA} Authentication
                  in IoT},
  journal      = {Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {20},
  year         = {2019},
  url          = {https://doi.org/10.3390/cryptography3030020},
  doi          = {10.3390/CRYPTOGRAPHY3030020},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/VenkatramanO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AgrawalCK18,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Jinkeon Kang},
  title        = {Deterministic Authenticated Encryption Scheme for Memory Constrained
                  Devices},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {37},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040037},
  doi          = {10.3390/CRYPTOGRAPHY2040037},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AgrawalCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AlvanosLS18,
  author       = {Dimitrios Alvanos and
                  Konstantinos Limniotis and
                  Stavros Stavrou},
  title        = {On the Cryptographic Features of a VoIP Service},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {3},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2010003},
  doi          = {10.3390/CRYPTOGRAPHY2010003},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AlvanosLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Anagnostopoulos18,
  author       = {Nikolaos Athanasios Anagnostopoulos and
                  Stefan Katzenbeisser and
                  John A. Chandy and
                  Fatemeh Tehranipoor},
  title        = {An Overview of DRAM-Based Security Primitives},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {7},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2020007},
  doi          = {10.3390/CRYPTOGRAPHY2020007},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Anagnostopoulos18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Anagnostopoulos18a,
  author       = {Nikolaos Athanasios Anagnostopoulos and
                  Tolga Arul and
                  Yufan Fan and
                  Christian Hatzfeld and
                  Andr{\'{e}} Schaller and
                  Wenjie Xiong and
                  Manishkumar Jain and
                  Muhammad Umair Saleem and
                  Jan Lotichius and
                  Sebastian Gabmeyer and
                  Jakub Szefer and
                  Stefan Katzenbeisser},
  title        = {Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect
                  for Run-Time Cryptography and Improved Security \({}^{\mbox{{\textdagger}}}\)},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {13},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030013},
  doi          = {10.3390/CRYPTOGRAPHY2030013},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Anagnostopoulos18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BaurB18,
  author       = {Sebastian Baur and
                  Holger Boche},
  title        = {Robust Secure Authentication and Data Storage with Perfect Secrecy},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {8},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2020008},
  doi          = {10.3390/CRYPTOGRAPHY2020008},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BaurB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BoyenH18,
  author       = {Xavier Boyen and
                  Thomas Haines},
  title        = {Forward-Secure Linkable Ring Signatures from Bilinear Maps},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {35},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040035},
  doi          = {10.3390/CRYPTOGRAPHY2040035},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BoyenH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CambouFPTP18,
  author       = {Bertrand Cambou and
                  Paul G. Flikkema and
                  James Palmer and
                  Donald Telesca and
                  Christopher Robert Philabaum},
  title        = {Can Ternary Computing Improve Information Assurance?},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {6},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2010006},
  doi          = {10.3390/CRYPTOGRAPHY2010006},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CambouFPTP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CasalRS18,
  author       = {Filipe Casal and
                  Jo{\~{a}}o Rasga and
                  Andr{\'{e}} Souto},
  title        = {Kolmogorov One-Way Functions Revisited},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {9},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2020009},
  doi          = {10.3390/CRYPTOGRAPHY2020009},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CasalRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChandrasekaranB18,
  author       = {Balaji Chandrasekaran and
                  Ramadoss Balakrishnan},
  title        = {An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy
                  Attribute Based Encryption Scheme in Cloud Environments},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {14},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030014},
  doi          = {10.3390/CRYPTOGRAPHY2030014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChandrasekaranB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChangHJ18,
  author       = {Joy Jo{-}Yi Chang and
                  Bo{-}Yuan Huang and
                  Justie Su{-}tzu Juan},
  title        = {A New Visual Multi-Secrets Sharing Scheme by Random Grids},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {24},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030024},
  doi          = {10.3390/CRYPTOGRAPHY2030024},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChangHJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ChenHJ18,
  author       = {Ying{-}Yu Chen and
                  Bo{-}Yuan Huang and
                  Justie Su{-}tzu Juan},
  title        = {A (\emph{k}, \emph{n})-Threshold Progressive Visual Secret Sharing
                  without Expansion},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {28},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040028},
  doi          = {10.3390/CRYPTOGRAPHY2040028},
  timestamp    = {Wed, 24 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/ChenHJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DangerHFGGHNPS18,
  author       = {Jean{-}Luc Danger and
                  Youssef El Housni and
                  Adrien Facon and
                  Cheikh Thiecoumba Gueye and
                  Sylvain Guilley and
                  Sylvie Herbel and
                  Ousmane Ndiaye and
                  Edoardo Persichetti and
                  Alexander Schaub},
  title        = {On the Performance and Security of Multiplication in \emph{GF}(2\({}^{\mbox{\emph{N}}}\))},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {25},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030025},
  doi          = {10.3390/CRYPTOGRAPHY2030025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DangerHFGGHNPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/DiehlAFKG18,
  author       = {William Diehl and
                  Abubakr Abdulgadir and
                  Farnoud Farahmand and
                  Jens{-}Peter Kaps and
                  Kris Gaj},
  title        = {Comparison of Cost of Protection against Differential Power Analysis
                  of Selected Authenticated Ciphers},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {26},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030026},
  doi          = {10.3390/CRYPTOGRAPHY2030026},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/DiehlAFKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FeF18,
  author       = {Sadiel de la Fe and
                  Carles Ferrer},
  title        = {A Secure Algorithm for Inversion Modulo 2\({}^{\mbox{\emph{k}}}\)},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {23},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030023},
  doi          = {10.3390/CRYPTOGRAPHY2030023},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FeF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/FroystadTJ18,
  author       = {Christian Fr{\o}ystad and
                  Inger Anne T{\o}ndel and
                  Martin Gilje Jaatun},
  title        = {Security Incident Information Exchange for Cloud Service Provisioning
                  Chains},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {41},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040041},
  doi          = {10.3390/CRYPTOGRAPHY2040041},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/FroystadTJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GandinoMR18,
  author       = {Filippo Gandino and
                  Bartolomeo Montrucchio and
                  Maurizio Rebaudengo},
  title        = {Redundancy in Key Management for WSNs},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {40},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040040},
  doi          = {10.3390/CRYPTOGRAPHY2040040},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GandinoMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GuoDT18,
  author       = {Yunxi Guo and
                  Timothy Dee and
                  Akhilesh Tyagi},
  title        = {Barrel Shifter Physical Unclonable Function Based Encryption},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {22},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030022},
  doi          = {10.3390/CRYPTOGRAPHY2030022},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GuoDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HanW18,
  author       = {Jialuo Han and
                  Jidong Wang},
  title        = {An Enhanced Key Management Scheme for LoRaWAN},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {34},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040034},
  doi          = {10.3390/CRYPTOGRAPHY2040034},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HanW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Hirose18,
  author       = {Shoichi Hirose},
  title        = {Sequential Hashing with Minimum Padding},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {11},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2020011},
  doi          = {10.3390/CRYPTOGRAPHY2020011},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Hirose18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/HuLCL18,
  author       = {Ziyuan Hu and
                  Shengli Liu and
                  Kefei Chen and
                  Joseph K. Liu},
  title        = {Revocable Identity-Based Encryption and Server-Aided Revocable {IBE}
                  from the Computational Diffie-Hellman Assumption},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {33},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040033},
  doi          = {10.3390/CRYPTOGRAPHY2040033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/HuLCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JamesGR18,
  author       = {Salome James and
                  N. B. Gayathri and
                  Punugu Vasudeva Reddy},
  title        = {Pairing Free Identity-Based Blind Signature Scheme with Message Recovery},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {29},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040029},
  doi          = {10.3390/CRYPTOGRAPHY2040029},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/JamesGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KameswariJ18,
  author       = {Pratha Anuradha Kameswari and
                  Lambadi Jyotsna},
  title        = {An Attack Bound for Small Multiplicative Inverse of \emph{{\(\varphi\)}}(\emph{N})
                  mod \emph{e} with a Composed Prime Sum \emph{p} + \emph{q} Using Sublattice
                  Based Techniques},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {36},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040036},
  doi          = {10.3390/CRYPTOGRAPHY2040036},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KameswariJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KangFV18,
  author       = {James Jin Kang and
                  Kiran Fahd and
                  Sitalakshmi Venkatraman},
  title        = {Trusted Time-Based Verification Model for Automatic Man-in-the-Middle
                  Attack Detection in Cybersecurity},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {38},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040038},
  doi          = {10.3390/CRYPTOGRAPHY2040038},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KangFV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KinsyBIM18,
  author       = {Michel A. Kinsy and
                  Lake Bu and
                  Mihailo Isakov and
                  Miguel Mark},
  title        = {Designing Secure Heterogeneous Multicore Systems from Untrusted Components},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {12},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030012},
  doi          = {10.3390/CRYPTOGRAPHY2030012},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KinsyBIM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Krovetz18,
  author       = {Ted Krovetz},
  title        = {The Definition and Software Performance of Hashstream, a Fast Length-Flexible
                  {PRF}},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {31},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040031},
  doi          = {10.3390/CRYPTOGRAPHY2040031},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Krovetz18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LauT18,
  author       = {Terry Shue Chien Lau and
                  Chik How Tan},
  title        = {A New Technique in Rank Metric Code-Based Encryption},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {32},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040032},
  doi          = {10.3390/CRYPTOGRAPHY2040032},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LauT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/LitchfieldH18,
  author       = {Alan T. Litchfield and
                  Jeff Herbert},
  title        = {ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global
                  Cross-Platform Software License Validation},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {10},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2020010},
  doi          = {10.3390/CRYPTOGRAPHY2020010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/LitchfieldH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/NitaMP18,
  author       = {Stefania Loredana Nita and
                  Marius Iulian Mihailescu and
                  Valentin Corneliu Pau},
  title        = {Security and Cryptographic Challenges for Authentication Based on
                  Biometrics Data},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {39},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040039},
  doi          = {10.3390/CRYPTOGRAPHY2040039},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/NitaMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/OmetovBM0MK18,
  author       = {Aleksandr Ometov and
                  Sergey Bezzateev and
                  Niko M{\"{a}}kitalo and
                  Sergey Andreev and
                  Tommi Mikkonen and
                  Yevgeni Koucheryavy},
  title        = {Multi-Factor Authentication: {A} Survey},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {1},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2010001},
  doi          = {10.3390/CRYPTOGRAPHY2010001},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/OmetovBM0MK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/OwenHCCSAP18,
  author       = {Don Owen Jr. and
                  Derek Heeger and
                  Calvin Chan and
                  Wenjie Che and
                  Fareena Saqib and
                  Matthew Areno and
                  Jim Plusquellic},
  title        = {An Autonomous, Self-Authenticating, and Self-Contained Secure Boot
                  Process for Field-Programmable Gate Arrays},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {15},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030015},
  doi          = {10.3390/CRYPTOGRAPHY2030015},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/OwenHCCSAP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Partala18,
  author       = {Juha Partala},
  title        = {Provably Secure Covert Communication on Blockchain},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {18},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030018},
  doi          = {10.3390/CRYPTOGRAPHY2030018},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Partala18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Persichetti18,
  author       = {Edoardo Persichetti},
  title        = {Efficient One-Time Signatures from Quasi-Cyclic Codes: {A} Full Treatment},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {30},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040030},
  doi          = {10.3390/CRYPTOGRAPHY2040030},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Persichetti18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PlusquellicA18,
  author       = {Jim Plusquellic and
                  Matthew Areno},
  title        = {Correlation-Based Robust Authentication (Cobra) Using Helper Data
                  Only},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {21},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030021},
  doi          = {10.3390/CRYPTOGRAPHY2030021},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/PlusquellicA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SakibKTRR18,
  author       = {Sadman Sakib and
                  Preeti Kumari and
                  Bashir M. Sabquat Bahar Talukder and
                  Md. Tauhidur Rahman and
                  Biswajit Ray},
  title        = {Non-Invasive Detection Method for Recycled Flash Memory Using Timing
                  Characteristics \({}^{\mbox{{\textdagger}}}\)},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {17},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030017},
  doi          = {10.3390/CRYPTOGRAPHY2030017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SakibKTRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SalamSBDW18,
  author       = {Md. Iftekhar Salam and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  title        = {Fault Attacks on the Authenticated Encryption Stream Cipher {MORUS}},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {4},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2010004},
  doi          = {10.3390/CRYPTOGRAPHY2010004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SalamSBDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SheikhC18,
  author       = {Rami Sheikh and
                  Rosario Cammarota},
  title        = {Improving Performance and Mitigating Fault Attacks Using Value Prediction},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {27},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040027},
  doi          = {10.3390/CRYPTOGRAPHY2040027},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SheikhC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/SuomalainenKKL18,
  author       = {Jani Suomalainen and
                  Adrian Kotelba and
                  Jari Kreku and
                  Sami Lehtonen},
  title        = {Evaluating the Efficiency of Physical and Cryptographic Security Solutions
                  for Quantum Immune IoT},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {5},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2010005},
  doi          = {10.3390/CRYPTOGRAPHY2010005},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/SuomalainenKKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Trostle18,
  author       = {Jonathan T. Trostle},
  title        = {{CMCC:} Misuse Resistant Authenticated Encryption with Minimal Ciphertext
                  Expansion},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {42},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040042},
  doi          = {10.3390/CRYPTOGRAPHY2040042},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Trostle18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/VascoRS18,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Angela Robinson and
                  Rainer Steinwandt},
  title        = {Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem
                  Inside \emph{S\({}_{\mbox{n}}\)}},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {16},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030016},
  doi          = {10.3390/CRYPTOGRAPHY2030016},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/VascoRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Vogt18,
  author       = {Andreas Vogt},
  title        = {Special Issue on Cryptographic Protocols},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {19},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030019},
  doi          = {10.3390/CRYPTOGRAPHY2030019},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Vogt18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/WehbeMK18,
  author       = {Taimour Wehbe and
                  Vincent John Mooney III and
                  David C. Keezer},
  title        = {Hardware-Based Run-Time Code Integrity in Embedded Devices},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {20},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2030020},
  doi          = {10.3390/CRYPTOGRAPHY2030020},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/WehbeMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/BricoutC17,
  author       = {R{\'{e}}mi Bricout and
                  Andr{\'{e}} Chailloux},
  title        = {Recursive Cheating Strategies for the Relativistic F\emph{\({}_{\mbox{Q}}\)}
                  Bit Commitment Protocol},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {14},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1020014},
  doi          = {10.3390/CRYPTOGRAPHY1020014},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/BricoutC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CheKMSP17,
  author       = {Wenjie Che and
                  Venkata K. Kajuluri and
                  Mitchell T. Martin and
                  Fareena Saqib and
                  Jim Plusquellic},
  title        = {Analysis of Entropy in a Hardware-Embedded Delay {PUF}},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {8},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010008},
  doi          = {10.3390/CRYPTOGRAPHY1010008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CheKMSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CheKSP17,
  author       = {Wenjie Che and
                  Venkata K. Kajuluri and
                  Fareena Saqib and
                  Jim Plusquellic},
  title        = {Leveraging Distributions in Physical Unclonable Functions},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {17},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030017},
  doi          = {10.3390/CRYPTOGRAPHY1030017},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CheKSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CheMPKSP17,
  author       = {Wenjie Che and
                  Mitchell T. Martin and
                  Goutham Pocklassery and
                  Venkata K. Kajuluri and
                  Fareena Saqib and
                  Jim Plusquellic},
  title        = {A Privacy-Preserving, Mutual PUF-Based Authentication Protocol},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {3},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010003},
  doi          = {10.3390/CRYPTOGRAPHY1010003},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CheMPKSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/CostaFO17,
  author       = {Daniel G. Costa and
                  Jos{\'{e}} Solenir Lima Figuer{\^{e}}do and
                  Gledson Oliveira},
  title        = {Cryptography in Wireless Multimedia Sensor Networks: {A} Survey and
                  Research Directions},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {4},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010004},
  doi          = {10.3390/CRYPTOGRAPHY1010004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/CostaFO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/EcclesH17,
  author       = {Tom Eccles and
                  Basel Halak},
  title        = {Performance Analysis of Secure and Private Billing Protocols for Smart
                  Metering},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {20},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030020},
  doi          = {10.3390/CRYPTOGRAPHY1030020},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/EcclesH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/EkladiousSG17,
  author       = {George S. Eskander Ekladious and
                  Robert Sabourin and
                  Eric Granger},
  title        = {Learning Global-Local Distance Metrics for Signature-Based Biometric
                  Cryptosystems},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {22},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030022},
  doi          = {10.3390/CRYPTOGRAPHY1030022},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/EkladiousSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/GilboaGN17,
  author       = {Shoni Gilboa and
                  Shay Gueron and
                  Mridul Nandi},
  title        = {Balanced Permutations Even-Mansour Ciphers},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {2},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010002},
  doi          = {10.3390/CRYPTOGRAPHY1010002},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/GilboaGN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Hatzivasilis17,
  author       = {George Hatzivasilis},
  title        = {Password-Hashing Status},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {10},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1020010},
  doi          = {10.3390/CRYPTOGRAPHY1020010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Hatzivasilis17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/IsikW17,
  author       = {Leyla Isik and
                  Arne Winterhof},
  title        = {Maximum-Order Complexity and Correlation Measures},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {7},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010007},
  doi          = {10.3390/CRYPTOGRAPHY1010007},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/IsikW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JeongAKL17,
  author       = {Hae{-}Duck J. Jeong and
                  WonHwi Ahn and
                  Hyeonggeun Kim and
                  Jong{-}Suk Ruth Lee},
  title        = {Anomalous Traffic Detection and Self-Similarity Analysis in the Environment
                  of ATMSim},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {24},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030024},
  doi          = {10.3390/CRYPTOGRAPHY1030024},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/JeongAKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/JinH0NFDD17,
  author       = {Chenglu Jin and
                  Charles Herder and
                  Ling Ren and
                  Phuong Ha Nguyen and
                  Benjamin Fuller and
                  Srinivas Devadas and
                  Marten van Dijk},
  title        = {{FPGA} Implementation of a Cryptographically-Secure {PUF} Based on
                  Learning Parity with Noise},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {23},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030023},
  doi          = {10.3390/CRYPTOGRAPHY1030023},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/JinH0NFDD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KashefiP17,
  author       = {Elham Kashefi and
                  Anna Pappa},
  title        = {Multiparty Delegated Quantum Computing},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {12},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1020012},
  doi          = {10.3390/CRYPTOGRAPHY1020012},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KashefiP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KashefiW17,
  author       = {Elham Kashefi and
                  Petros Wallden},
  title        = {Garbled Quantum Computation},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {6},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010006},
  doi          = {10.3390/CRYPTOGRAPHY1010006},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KashefiW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Kim17,
  author       = {Kwangjo Kim},
  title        = {\emph{Cryptography}: {A} New Open Access Journal},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010001},
  doi          = {10.3390/CRYPTOGRAPHY1010001},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Kim17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/KulshresthaRDS17,
  author       = {Anunay Kulshrestha and
                  Akshay Rampuria and
                  Matthew Denton and
                  Ashwin Sreenivas},
  title        = {Cryptographically Secure Multiparty Computation and Distributed Auctions
                  Using Homomorphic Encryption},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {25},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030025},
  doi          = {10.3390/CRYPTOGRAPHY1030025},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/KulshresthaRDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/PljonkinRS17,
  author       = {Anton Pljonkin and
                  Konstantin E. Rumyantsev and
                  Pradeep Kumar Singh},
  title        = {Synchronization in Quantum Key Distribution Systems},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {18},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030018},
  doi          = {10.3390/CRYPTOGRAPHY1030018},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/PljonkinRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RenwickM17,
  author       = {Sarah Louise Renwick and
                  Keith M. Martin},
  title        = {Practical Architectures for Deployment of Searchable Encryption in
                  a Cloud Environment},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {19},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030019},
  doi          = {10.3390/CRYPTOGRAPHY1030019},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/RenwickM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RomanoS17,
  author       = {Diego Romano and
                  Giovanni Schmid},
  title        = {Beyond Bitcoin: {A} Critical Look at Blockchain-Based Systems},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {15},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1020015},
  doi          = {10.3390/CRYPTOGRAPHY1020015},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/RomanoS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/RoyK17,
  author       = {Swapnoneel Roy and
                  Chanchal Khatwani},
  title        = {Cryptanalysis and Improvement of {ECC} Based Authentication and Key
                  Exchanging Protocols},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {9},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010009},
  doi          = {10.3390/CRYPTOGRAPHY1010009},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/RoyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Shaw17,
  author       = {Harry C. Shaw},
  title        = {A Cryptographic System Based upon the Principles of Gene Expression},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {21},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030021},
  doi          = {10.3390/CRYPTOGRAPHY1030021},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Shaw17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Sikora17,
  author       = {Jamie Sikora},
  title        = {Simple, Near-Optimal Quantum Protocols for Die-Rolling},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {11},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1020011},
  doi          = {10.3390/CRYPTOGRAPHY1020011},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Sikora17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Sklavos17,
  author       = {Nicolas Sklavos},
  title        = {Privacy in a Digital, Networked World: Technologies, Implications
                  and Solutions. By Sherali Zeadally and Mohamad Badra. Springer International
                  Publishing: 418 pp.; {\textdollar}51.89; {ISBN-10:} 3319084690, {ISBN-13:}
                  978-3319084695},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {5},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010005},
  doi          = {10.3390/CRYPTOGRAPHY1010005},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/Sklavos17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Thullier0M17,
  author       = {Florentin Thullier and
                  Bruno Bouchard and
                  Bob{-}Antoine Jerry M{\'{e}}n{\'{e}}las},
  title        = {A Text-Independent Speaker Authentication System for Mobile Devices},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {16},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1030016},
  doi          = {10.3390/CRYPTOGRAPHY1030016},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Thullier0M17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZouL0PS17,
  author       = {Xukai Zou and
                  Huian Li and
                  Feng Li and
                  Wei Peng and
                  Yan Sui},
  title        = {Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling
                  an Open and Fair Election},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {13},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1020013},
  doi          = {10.3390/CRYPTOGRAPHY1020013},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZouL0PS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics