Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/cryptography:"
@article{DBLP:journals/cryptography/BaigEY24, author = {Ahmed Fraz Baig and Sigurd Eskeland and Bian Yang}, title = {Novel and Efficient Privacy-Preserving Continuous Authentication}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {3}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010003}, doi = {10.3390/CRYPTOGRAPHY8010003}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BaigEY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BeheraR24, author = {Sagarika Behera and Prathuri Jhansi Rani}, title = {FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {8}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010008}, doi = {10.3390/CRYPTOGRAPHY8010008}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BeheraR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChenYLXCL24, author = {Chang Chen and Guoyu Yang and Zhihao Li and Fuan Xiao and Qi Chen and Jin Li}, title = {Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {6}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010006}, doi = {10.3390/CRYPTOGRAPHY8010006}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ChenYLXCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JiangBSGPZZL24, author = {Yinhao Jiang and Mir Ali Rezazadeh Baee and Leonie Ruth Simpson and Praveen Gauravaram and Josef Pieprzyk and Tanveer A. Zia and Zhen Zhao and Zung Le}, title = {Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {5}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010005}, doi = {10.3390/CRYPTOGRAPHY8010005}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/JiangBSGPZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KabilAA24, author = {Ahmad Kabil and Heba Aslan and Marianne Azer}, title = {Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {4}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010004}, doi = {10.3390/CRYPTOGRAPHY8010004}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KabilAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NingCSC24, author = {Yan{-}Duan Ning and Yan{-}Haw Chen and Cheng{-}Sin Shih and Shao{-}I Chu}, title = {Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {11}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010011}, doi = {10.3390/CRYPTOGRAPHY8010011}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NingCSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SebeS24, author = {Francesc Seb{\'{e}} and Sergi Sim{\'{o}}n}, title = {E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {10}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010010}, doi = {10.3390/CRYPTOGRAPHY8010010}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SebeS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SelvamT24, author = {Ravikumar Selvam and Akhilesh Tyagi}, title = {Residue Number System {(RNS)} and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {1}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010001}, doi = {10.3390/CRYPTOGRAPHY8010001}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SelvamT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TsantikidouS24, author = {Kyriaki Tsantikidou and Nicolas Sklavos}, title = {Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {7}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010007}, doi = {10.3390/CRYPTOGRAPHY8010007}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TsantikidouS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/UpadhyayaGP24, author = {Devanshi Upadhyaya and Ma{\"{e}}l Gay and Ilia Polian}, title = {Locking-Enabled Security Analysis of Cryptographic Circuits}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {2}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010002}, doi = {10.3390/CRYPTOGRAPHY8010002}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/UpadhyayaGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/UzunerK24, author = {Hakan Uzuner and Elif Bilge Kavun}, title = {{NLU-V:} {A} Family of Instruction Set Extensions for Efficient Symmetric Cryptography on {RISC-V}}, journal = {Cryptogr.}, volume = {8}, number = {1}, pages = {9}, year = {2024}, url = {https://doi.org/10.3390/cryptography8010009}, doi = {10.3390/CRYPTOGRAPHY8010009}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/UzunerK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AbuFarajAOAAAA23, author = {Mua'ad Abu{-}Faraj and Abeer Y. Al{-}Hyari and Charlie Obimbo and Khaled Aldebei and Ismail Al{-}Taharwa and Ziad A. Alqadi and Orabe Almanaseer}, title = {Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {20}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020020}, doi = {10.3390/CRYPTOGRAPHY7020020}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AbuFarajAOAAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Alawatugoda23, author = {Janaka Alawatugoda}, title = {Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {1}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010001}, doi = {10.3390/CRYPTOGRAPHY7010001}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Alawatugoda23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlmukhlifiV23, author = {Reham Almukhlifi and Poorvi L. Vora}, title = {Linear Cryptanalysis of Reduced-Round Simeck Using Super Rounds}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {8}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010008}, doi = {10.3390/CRYPTOGRAPHY7010008}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlmukhlifiV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlupothaBM23, author = {Jayamine Alupotha and Xavier Boyen and Matthew McKague}, title = {{LACT+:} Practical Post-Quantum Scalable Confidential Transactions}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {24}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020024}, doi = {10.3390/CRYPTOGRAPHY7020024}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlupothaBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AmpatzisA23, author = {Michael Ampatzis and Theodore Andronikos}, title = {Quantum Secret Aggregation Utilizing a Network of Agents}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {5}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010005}, doi = {10.3390/CRYPTOGRAPHY7010005}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AmpatzisA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AndronikosS23, author = {Theodore Andronikos and Alla Sirokofskich}, title = {One-to-Many Simultaneous Secure Quantum Information Transmission}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {64}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040064}, doi = {10.3390/CRYPTOGRAPHY7040064}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/AndronikosS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AugustS23, author = {David A. August and Anne C. Smith}, title = {PudgyTurtle Mode Resists Bit-Flipping Attacks}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {25}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020025}, doi = {10.3390/CRYPTOGRAPHY7020025}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AugustS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BespalovKNOV23, author = {Yuri Bespalov and Lyudmila Kovalchuk and Hanna Nelasa and Roman Oliynykov and Rob Viglione}, title = {Models for Generation of Proof Forest in zk-SNARK Based Sidechains}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {14}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010014}, doi = {10.3390/CRYPTOGRAPHY7010014}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BespalovKNOV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BikosNPS23, author = {Anastasios N. Bikos and Panagiotis E. Nastou and Georgios Petroudis and Yannis C. Stamatiou}, title = {Random Number Generators: Principles and Applications}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {54}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040054}, doi = {10.3390/CRYPTOGRAPHY7040054}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BikosNPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BoudabraN23, author = {Maher Boudabra and Abderrahmane Nitaj}, title = {A New {RSA} Variant Based on Elliptic Curves}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {37}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030037}, doi = {10.3390/CRYPTOGRAPHY7030037}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BoudabraN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CamachoRuizMSB23, author = {Eros Camacho{-}Ruiz and Macarena C. Mart{\'{\i}}nez{-}Rodr{\'{\i}}guez and Santiago S{\'{a}}nchez{-}Solano and Piedad Brox}, title = {Timing-Attack-Resistant Acceleration of {NTRU} Round 3 Encryption on Resource-Constrained Embedded Systems}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {29}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020029}, doi = {10.3390/CRYPTOGRAPHY7020029}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CamachoRuizMSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CatuognoG23, author = {Luigi Catuogno and Clemente Galdi}, title = {Secure Firmware Update: Challenges and Solutions}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {30}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020030}, doi = {10.3390/CRYPTOGRAPHY7020030}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CatuognoG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Cesati23, author = {Marco Cesati}, title = {A New Idea for {RSA} Backdoors}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {45}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030045}, doi = {10.3390/CRYPTOGRAPHY7030045}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Cesati23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ClearT23, author = {Michael Clear and Hitesh Tewari}, title = {Anonymous Homomorphic {IBE} with Application to Anonymous Aggregation}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {22}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020022}, doi = {10.3390/CRYPTOGRAPHY7020022}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ClearT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DamTHPH23, author = {Duc{-}Thuan Dam and Thai{-}Ha Tran and Van{-}Phuc Hoang and Cong{-}Kha Pham and Trong{-}Thuc Hoang}, title = {A Survey of Post-Quantum Cryptography: Start of a New Race}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {40}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030040}, doi = {10.3390/CRYPTOGRAPHY7030040}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DamTHPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DamodharanMS23, author = {Jamunarani Damodharan and Emalda Roslin Susai Michael and Nasir Shaikh{-}Husin}, title = {High Throughput {PRESENT} Cipher Hardware Architecture for the Medical IoT Applications}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {6}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010006}, doi = {10.3390/CRYPTOGRAPHY7010006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DamodharanMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DeCusatisGIPPV23, author = {Casimer M. DeCusatis and Brian Gormanly and John Iacino and Reed Percelay and Alex Pingue and Justin Valdez}, title = {Cybersecurity Test Bed for Smart Contracts}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {15}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010015}, doi = {10.3390/CRYPTOGRAPHY7010015}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DeCusatisGIPPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DolmetaMM23, author = {Alessandra Dolmeta and Maurizio Martina and Guido Masera}, title = {Comparative Study of Keccak {SHA-3} Implementations}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {60}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040060}, doi = {10.3390/CRYPTOGRAPHY7040060}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DolmetaMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DuanLL23, author = {Li Duan and Yong Li and Lijun Liao}, title = {Practical Certificate-Less Infrastructure with Application in {TLS}}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {63}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040063}, doi = {10.3390/CRYPTOGRAPHY7040063}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DuanLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DunmoreSJ23, author = {Aeryn Dunmore and Juliet Samandari and Julian Jang{-}Jaccard}, title = {Matrix Encryption Walks for Lightweight Cryptography}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {41}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030041}, doi = {10.3390/CRYPTOGRAPHY7030041}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DunmoreSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FengL23, author = {Tao Feng and Yufeng Liu}, title = {Research on PoW Protocol Security under Optimized Long Delay Attack}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {32}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020032}, doi = {10.3390/CRYPTOGRAPHY7020032}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FengL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GuoLJWF23, author = {Xian Guo and Ye Li and Yongbo Jiang and Jing Wang and Junli Fang}, title = {Privacy-Preserving k-Nearest Neighbor Classification over Malicious Participants in Outsourced Cloud Environments}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {59}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040059}, doi = {10.3390/CRYPTOGRAPHY7040059}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GuoLJWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GuoZGQL23, author = {Yihong Guo and Jinxin Zuo and Ziyu Guo and Jiahao Qi and Yueming Lu}, title = {Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {11}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010011}, doi = {10.3390/CRYPTOGRAPHY7010011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GuoZGQL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HaddadPCLB23, author = {Joseph Haddad and Nikolaos Pitropakis and Christos Chrysoulas and Mouad Lemoudden and William J. Buchanan}, title = {Attacking Windows Hello for Business: Is It What We Were Promised?}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {9}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010009}, doi = {10.3390/CRYPTOGRAPHY7010009}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HaddadPCLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HeF23, author = {Buzhen He and Tao Feng}, title = {Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {16}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020016}, doi = {10.3390/CRYPTOGRAPHY7020016}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HeF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HuL23, author = {Hwai{-}Tsu Hu and Tung{-}Tsun Lee}, title = {Hiding Full-Color Images into Audio with Visual Enhancement via Residual Networks}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {47}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040047}, doi = {10.3390/CRYPTOGRAPHY7040047}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/HuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KangS23, author = {Jeong Hwa Kang and Minhye Seo}, title = {Enhanced Authentication for Decentralized IoT Access Control Architecture}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {42}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030042}, doi = {10.3390/CRYPTOGRAPHY7030042}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KangS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KhashanKAAAAA23, author = {Osama Ahmed Khashan and Nour Mahmoud Khafajah and Waleed Alomoush and Mohammad Alshinwan and Sultan Alamri and Samer Atawneh and Mutasem K. Alsmadi}, title = {Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {12}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010012}, doi = {10.3390/CRYPTOGRAPHY7010012}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KhashanKAAAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KodukhovPKKPV23, author = {Aleksei D. Kodukhov and Valeria A. Pastushenko and Nikita S. Kirsanov and Dmitry A. Kronberg and Markus Pflitsch and Valerii M. Vinokur}, title = {Boosting Quantum Key Distribution via the End-to-End Loss Control}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {38}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030038}, doi = {10.3390/CRYPTOGRAPHY7030038}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KodukhovPKKPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KorziliusS23, author = {Stan Korzilius and Berry Schoenmakers}, title = {Divisions and Square Roots with Tight Error Analysis from Newton-Raphson Iteration in Secure Fixed-Point Arithmetic}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {43}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030043}, doi = {10.3390/CRYPTOGRAPHY7030043}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KorziliusS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KoyamaTFBT23, author = {Atsuki Koyama and Van Chuong Tran and Manato Fujimoto and Vo Nguyen Quoc Bao and Thi Hong Tran}, title = {A Decentralized {COVID-19} Vaccine Tracking System Using Blockchain Technology}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {13}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010013}, doi = {10.3390/CRYPTOGRAPHY7010013}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KoyamaTFBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KulkarniKTIB23, author = {Pallavi Kulkarni and Rajashri Khanai and Dattaprasad Torse and Nalini Iyer and Gururaj Bindagi}, title = {Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {23}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020023}, doi = {10.3390/CRYPTOGRAPHY7020023}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KulkarniKTIB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KurokawaISYU23, author = {Takashi Kurokawa and Takuma Ito and Naoyuki Shinohara and Akihiro Yamamura and Shigenori Uchiyama}, title = {Selection Strategy of F4-Style Algorithm to Solve {MQ} Problems Related to {MPKC}}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {10}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010010}, doi = {10.3390/CRYPTOGRAPHY7010010}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KurokawaISYU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LataC23, author = {Kusum Lata and Linga Reddy Cenkeramaddi}, title = {FPGA-Based {PUF} Designs: {A} Comprehensive Review and Comparative Analysis}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {55}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040055}, doi = {10.3390/CRYPTOGRAPHY7040055}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LataC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LeeGSAL23, author = {Cheng{-}Chi Lee and Mehdi Gheisari and Mohammad Javad Shayegan and Milad Taleby Ahvanooey and Yang Liu}, title = {Privacy-Preserving Techniques in Cloud/Fog and Internet of Things}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {51}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040051}, doi = {10.3390/CRYPTOGRAPHY7040051}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LeeGSAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LeevikDB23, author = {Anton Leevik and Vadim Davydov and Sergey Bezzateev}, title = {Threshold Lattice-Based Signature Scheme for Authentication by Wearable Devices}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {33}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030033}, doi = {10.3390/CRYPTOGRAPHY7030033}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LeevikDB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LellaS23, author = {Eufemia Lella and Giovanni Schmid}, title = {On the Security of Quantum Key Distribution Networks}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {53}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040053}, doi = {10.3390/CRYPTOGRAPHY7040053}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LellaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Li23, author = {Yamin Li}, title = {Hardware Implementations of Elliptic Curve Cryptography Using Shift-Sub Based Modular Multiplication Algorithms}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {57}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040057}, doi = {10.3390/CRYPTOGRAPHY7040057}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LinLW23, author = {Je{-}Kuan Lin and Wun{-}Ting Lin and Ja{-}Ling Wu}, title = {Flexible and Efficient Multi-Keyword Ranked Searchable Attribute-Based Encryption Schemes}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {28}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020028}, doi = {10.3390/CRYPTOGRAPHY7020028}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LinLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LiuHTTHY23, author = {Jinhui Liu and Tianyi Han and Maolin Tan and Bo Tang and Wei Hu and Yong Yu}, title = {A Publicly Verifiable E-Voting System Based on Biometrics}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {62}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040062}, doi = {10.3390/CRYPTOGRAPHY7040062}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LiuHTTHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LizamaPerez23, author = {Luis Adri{\'{a}}n Lizama{-}P{\'{e}}rez}, title = {{XOR} Chain and Perfect Secrecy at the Dawn of the Quantum Era}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {50}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040050}, doi = {10.3390/CRYPTOGRAPHY7040050}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LizamaPerez23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MaimutT23, author = {Diana Maimut and George Teseleanu}, title = {Inferring Bivariate Polynomials for Homomorphic Encryption Application}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {31}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020031}, doi = {10.3390/CRYPTOGRAPHY7020031}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MaimutT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MezinaO23, author = {Anzhelika Mezina and Aleksandr Ometov}, title = {Detecting Smart Contract Vulnerabilities with Combined Binary and Multiclass Classification}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {34}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030034}, doi = {10.3390/CRYPTOGRAPHY7030034}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/MezinaO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MohanA23, author = {Navya Mohan and J. P. Anita}, title = {Early Detection of Clustered Trojan Attacks on Integrated Circuits Using Transition Delay Fault Model}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {4}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010004}, doi = {10.3390/CRYPTOGRAPHY7010004}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MohanA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NagarajanRTKG23, author = {Karthikeyan Nagarajan and Rupshali Roy and Rasit Onur Topaloglu and Sachhidh Kannan and Swaroop Ghosh}, title = {{SCANN:} Side Channel Analysis of Spiking Neural Networks}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {17}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020017}, doi = {10.3390/CRYPTOGRAPHY7020017}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NagarajanRTKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NguyenPH23, author = {Trong{-}Hung Nguyen and Cong{-}Kha Pham and Trong{-}Thuc Hoang}, title = {A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {46}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040046}, doi = {10.3390/CRYPTOGRAPHY7040046}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/NguyenPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NicholasATS23, author = {Geraldine Shirley Nicholas and Dhruvakumar Vikas Aklekar and Bhavin Thakar and Fareena Saqib}, title = {Secure Instruction and Data-Level Information Flow Tracking Model for {RISC-V}}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {58}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040058}, doi = {10.3390/CRYPTOGRAPHY7040058}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/NicholasATS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NitajR23, author = {Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Applications of Neural Network-Based {AI} in Cryptography}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {39}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030039}, doi = {10.3390/CRYPTOGRAPHY7030039}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/NitajR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Office23, author = {Cryptography Editorial Office}, title = {Acknowledgment to the Reviewers of Cryptography in 2022}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010003}, doi = {10.3390/CRYPTOGRAPHY7010003}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Office23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PapadopoulosW23, author = {Iason Papadopoulos and Jiabo Wang}, title = {Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {2}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010002}, doi = {10.3390/CRYPTOGRAPHY7010002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PapadopoulosW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ParkKM23, author = {Seonghwan Park and Hyunil Kim and Inkyu Moon}, title = {Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {35}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030035}, doi = {10.3390/CRYPTOGRAPHY7030035}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/ParkKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ParrillaGCRM23, author = {Luis Parrilla and Antonio Garc{\'{\i}}a and Encarnaci{\'{o}}n Castillo and Juan Antonio L{\'{o}}pez Ramos and Uwe Meyer{-}Baese}, title = {Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {26}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020026}, doi = {10.3390/CRYPTOGRAPHY7020026}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ParrillaGCRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PereiraTSMSP23, author = {Bruno Miguel Batista Pereira and Jos{\'{e}} Manuel Torres and Pedro Miguel Sobral and Rui S. Moreira and Christophe Pinto de Almeida Soares and Ivo Pereira}, title = {Blockchain-Based Electronic Voting: {A} Secure and Transparent Solution}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {27}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020027}, doi = {10.3390/CRYPTOGRAPHY7020027}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PereiraTSMSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RameshDSASS23, author = {Raghunandan Ramesh and Radhakrishna Dodmane and Surendra Shetty and Ganesh Aithal and Monalisa Sahu and Aditya Kumar Sahu}, title = {A Novel and Secure Fake-Modulus Based Rabin-{\cyrchar\CYRABHDZE} Cryptosystem}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {44}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030044}, doi = {10.3390/CRYPTOGRAPHY7030044}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/RameshDSASS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SalaS23, author = {Riccardo Della Sala and Giuseppe Scotti}, title = {A Novel {FPGA} Implementation of the {NAND-PUF} with Minimal Resource Usage and High Reliability}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {18}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020018}, doi = {10.3390/CRYPTOGRAPHY7020018}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SalaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SchoenmakersS23, author = {Berry Schoenmakers and Toon Segers}, title = {Secure Groups for Threshold Cryptography and Number-Theoretic Multiparty Computation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {56}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040056}, doi = {10.3390/CRYPTOGRAPHY7040056}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SchoenmakersS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SoroceanuBM23, author = {Tudor A. A. Soroceanu and Nicolas Buchmann and Marian Margraf}, title = {On Multiple Encryption for Public-Key Cryptography}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {49}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040049}, doi = {10.3390/CRYPTOGRAPHY7040049}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SoroceanuBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Taherdoost23, author = {Hamed Taherdoost}, title = {The Role of Blockchain in Medical Data Sharing}, journal = {Cryptogr.}, volume = {7}, number = {3}, pages = {36}, year = {2023}, url = {https://doi.org/10.3390/cryptography7030036}, doi = {10.3390/CRYPTOGRAPHY7030036}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Taherdoost23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TahirQKLA23, author = {Mehwish Tahir and Yuansong Qiao and Nadia Kanwal and Brian Lee and Mamoona Naveed Asghar}, title = {Privacy Preserved Video Summarization of Road Traffic Events for IoT Smart Cities}, journal = {Cryptogr.}, volume = {7}, number = {1}, pages = {7}, year = {2023}, url = {https://doi.org/10.3390/cryptography7010007}, doi = {10.3390/CRYPTOGRAPHY7010007}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TahirQKLA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TrivediBKT23, author = {Devharsh Trivedi and Aymen Boudguiga and Nesrine Kaaniche and Nikos Triandopoulos}, title = {SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {52}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040052}, doi = {10.3390/CRYPTOGRAPHY7040052}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/TrivediBKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/WalskaarTC23, author = {Ivar Walskaar and Minh Christian Tran and Ferhat {\"{O}}zg{\"{u}}r {\c{C}}atak}, title = {A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {48}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040048}, doi = {10.3390/CRYPTOGRAPHY7040048}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/WalskaarTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/YuMM23, author = {Mingfei Yu and Dewmini Sudara Marakkalage and Giovanni De Micheli}, title = {Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {61}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040061}, doi = {10.3390/CRYPTOGRAPHY7040061}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/YuMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Zajac23, author = {Pavol Zajac}, title = {Algebraic Cryptanalysis with {MRHS} Equations}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {19}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020019}, doi = {10.3390/CRYPTOGRAPHY7020019}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Zajac23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZhouZWCZ23, author = {Quan Zhou and Yulong Zheng and Kaijun Wei and Minhui Chen and Zhikang Zeng}, title = {A Multi-Party Functional Signatures Scheme for Private Blockchain}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {21}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020021}, doi = {10.3390/CRYPTOGRAPHY7020021}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ZhouZWCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/0007S22, author = {Tao Feng and Jiewen Si}, title = {Certificateless Searchable Encryption Scheme in Multi-User Environment}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {61}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040061}, doi = {10.3390/CRYPTOGRAPHY6040061}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/0007S22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Abushgra22, author = {Abdulbast A. Abushgra}, title = {Variations of {QKD} Protocols Based on Conventional System Measurements: {A} Literature Review}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {12}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010012}, doi = {10.3390/CRYPTOGRAPHY6010012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Abushgra22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Adams22, author = {Carlisle Adams}, title = {Improving User Privacy in Identity-Based Encryption Environments}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {55}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040055}, doi = {10.3390/CRYPTOGRAPHY6040055}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Adams22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AddobeaLOH22, author = {Abigail Akosua Addobea and Qianmu Li and Isaac Amankona Obiri and Jun Hou}, title = {A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {33}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030033}, doi = {10.3390/CRYPTOGRAPHY6030033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AddobeaLOH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlmseidinAAA22, author = {Mohammad Almseidin and Mouhammd Alkasassbeh and Maen Alzubi and Jamil Al{-}Sawwa}, title = {Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {24}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020024}, doi = {10.3390/CRYPTOGRAPHY6020024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlmseidinAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ArfaouiAGT22, author = {Ghada Arfaoui and Gildas Avoine and Olivier Gimenez and Jacques Traor{\'{e}}}, title = {{ICRP:} Internet-Friendly Cryptographic Relay-Detection Protocol}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {52}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040052}, doi = {10.3390/CRYPTOGRAPHY6040052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ArfaouiAGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AzzoliniR22, author = {Damiano Azzolini and Fabrizio Riguzzi}, title = {Probabilistic Logic Models for the Lightning Network}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {29}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020029}, doi = {10.3390/CRYPTOGRAPHY6020029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AzzoliniR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BandaraHWA22, author = {Harshana Bandara and Yasitha Herath and Thushara Weerasundara and Janaka Alawatugoda}, title = {On Advances of Lattice-Based Cryptographic Schemes and Their Implementations}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {56}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040056}, doi = {10.3390/CRYPTOGRAPHY6040056}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BandaraHWA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BanerjeeT22, author = {Aritra Banerjee and Hitesh Tewari}, title = {Multiverse of HawkNess: {A} Universally-Composable MPC-Based Hawk Variant}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {39}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030039}, doi = {10.3390/CRYPTOGRAPHY6030039}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BanerjeeT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BarenghiFP22, author = {Alessandro Barenghi and Gioele Falcetti and Gerardo Pelosi}, title = {Locating Side Channel Leakage in Time through Matched Filters}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {26}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020026}, doi = {10.3390/CRYPTOGRAPHY6020026}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BarenghiFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BazydloWK22, author = {Grzegorz Bazydlo and Remigiusz Wisniewski and Kamil Kozdr{\'{o}}j}, title = {Trusted and Secure Blockchain-Based Durable Medium Electronic Service}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {10}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010010}, doi = {10.3390/CRYPTOGRAPHY6010010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BazydloWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CardellRF22, author = {Sara D. Cardell and Ver{\'{o}}nica Requena and Amparo F{\'{u}}ster{-}Sabater}, title = {Computational Analysis of Interleaving PN-Sequences with Different Polynomials}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {21}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020021}, doi = {10.3390/CRYPTOGRAPHY6020021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CardellRF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChauhanGG22, author = {Sneha Chauhan and Sugata Gangopadhyay and Aditi Kar Gangopadhyay}, title = {Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {62}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040062}, doi = {10.3390/CRYPTOGRAPHY6040062}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/ChauhanGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CiampiRS22, author = {Mario Ciampi and Diego Romano and Giovanni Schmid}, title = {Process Authentication through Blockchain: Three Case Studies}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {58}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040058}, doi = {10.3390/CRYPTOGRAPHY6040058}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/CiampiRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DattaZBS22, author = {Rajesh Datta and Guangwei Zhao and Kanad Basu and Kaveh Shamsi}, title = {A Security Analysis of Circuit Clock Obfuscation}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {43}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030043}, doi = {10.3390/CRYPTOGRAPHY6030043}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DattaZBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DeeRT22, author = {Timothy Dee and Ian Richardson and Akhilesh Tyagi}, title = {Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {14}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020014}, doi = {10.3390/CRYPTOGRAPHY6020014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DeeRT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DrzazgaK22, author = {Bartosz Drzazga and Lukasz Krzywiecki}, title = {Review of Chosen Isogeny-Based Cryptographic Schemes}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {27}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020027}, doi = {10.3390/CRYPTOGRAPHY6020027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DrzazgaK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FauziHR22, author = {Prastudy Fauzi and Martha Norberg Hovd and H{\aa}vard Raddum}, title = {On the {IND-CCA1} Security of {FHE} Schemes}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {13}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010013}, doi = {10.3390/CRYPTOGRAPHY6010013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FauziHR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FengMZZY22, author = {Haogang Feng and Gaoze Mu and Shida Zhong and Peichang Zhang and Tao Yuan}, title = {Benchmark Analysis of {YOLO} Performance on Edge Intelligence Devices}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {16}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020016}, doi = {10.3390/CRYPTOGRAPHY6020016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FengMZZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GaoYZL22, author = {Wenhua Gao and Li Yang and Daode Zhang and Xia Liu}, title = {Quantum Identity-Based Encryption from the Learning with Errors Problem}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {9}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010009}, doi = {10.3390/CRYPTOGRAPHY6010009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GaoYZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GoncalvesM22, author = {Brian Goncalves and Atefeh Mashatan}, title = {Tightly Secure {PKE} Combiner in the Quantum Random Oracle Model}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {15}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020015}, doi = {10.3390/CRYPTOGRAPHY6020015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GoncalvesM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GueronPS22, author = {Shay Gueron and Edoardo Persichetti and Paolo Santini}, title = {Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {5}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010005}, doi = {10.3390/CRYPTOGRAPHY6010005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GueronPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Ham22, author = {Byoung S. Ham}, title = {Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {4}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010004}, doi = {10.3390/CRYPTOGRAPHY6010004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Ham22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HashimSS22, author = {Faiza Hashim and Khaled Shuaib and Farag M. Sallabi}, title = {Connected Blockchain Federations for Sharing Electronic Health Records}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {47}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030047}, doi = {10.3390/CRYPTOGRAPHY6030047}, timestamp = {Sat, 24 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/HashimSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/IbrahimAAA22, author = {Dina Ibrahim and Kareem Ahmed and Mohamed Abdallah and Abdelmgeid A. Ali}, title = {A New Chaotic-Based {RGB} Image Encryption Technique Using a Nonlinear Rotational 16 {\texttimes} 16 {DNA} Playfair Matrix}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {28}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020028}, doi = {10.3390/CRYPTOGRAPHY6020028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/IbrahimAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JemihinTC22, author = {Zulianie Binti Jemihin and Soo Fun Tan and Gwo Chin Chung}, title = {Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: {A} Survey}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {40}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030040}, doi = {10.3390/CRYPTOGRAPHY6030040}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/JemihinTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KampourakisCKDZ22, author = {Vyron Kampourakis and Efstratios Chatzoglou and Georgios Kambourakis and Apostolos Dolmes and Christos D. Zaroliagis}, title = {WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {53}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040053}, doi = {10.3390/CRYPTOGRAPHY6040053}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KampourakisCKDZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KharchenkoPIFI22, author = {Vyacheslav Kharchenko and Yuriy Ponochovnyi and Oleg Ivanchenko and Herman Fesenko and Oleg Illiashenko}, title = {Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {44}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030044}, doi = {10.3390/CRYPTOGRAPHY6030044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KharchenkoPIFI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Kieu-Do-NguyenP22, author = {Binh Kieu{-}Do{-}Nguyen and Cuong Pham{-}Quoc and Ngoc{-}Thinh Tran and Cong{-}Kha Pham and Trong{-}Thuc Hoang}, title = {Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {25}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020025}, doi = {10.3390/CRYPTOGRAPHY6020025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Kieu-Do-NguyenP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KimCSBK22, author = {Jongkil Kim and Yang{-}Wai Chow and Willy Susilo and Joonsang Baek and Intae Kim}, title = {Functional Encryption for Pattern Matching with a Hidden String}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {1}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010001}, doi = {10.3390/CRYPTOGRAPHY6010001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KimCSBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KlamtiH22, author = {Jean Belo Klamti and M. Anwar Hasan}, title = {Post-Quantum Two-Party Adaptor Signature Based on Coding Theory}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {6}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010006}, doi = {10.3390/CRYPTOGRAPHY6010006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KlamtiH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KoptyraO22, author = {Katarzyna Koptyra and Marek R. Ogiela}, title = {Subliminal Channels in Visual Cryptography}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {46}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030046}, doi = {10.3390/CRYPTOGRAPHY6030046}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KoptyraO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KudzinTTI22, author = {Alexander Kudzin and Kentaroh Toyoda and Satoshi Takayama and Atsushi Ishigame}, title = {Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {57}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040057}, doi = {10.3390/CRYPTOGRAPHY6040057}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KudzinTTI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KumarMSJAR22, author = {Vipin Kumar and Navneet Malik and Jimmy Singla and N. Z. Jhanjhi and Fathi Amsaad and Abdul Razaque}, title = {Light Weight Authentication Scheme for Smart Home IoT Devices}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {37}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030037}, doi = {10.3390/CRYPTOGRAPHY6030037}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KumarMSJAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LabaoA22, author = {Alfonso B. Labao and Henry N. Adorna}, title = {A {CCA-PKE} Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {2}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010002}, doi = {10.3390/CRYPTOGRAPHY6010002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LabaoA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LabaoA22a, author = {Alfonso B. Labao and Henry N. Adorna}, title = {Cryptographic Rational Secret Sharing Schemes over General Networks}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {50}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040050}, doi = {10.3390/CRYPTOGRAPHY6040050}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LabaoA22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LiagkouNSS22, author = {Vasiliki Liagkou and Panayotis E. Nastou and Paul G. Spirakis and Yannis C. Stamatiou}, title = {How Hard Is It to Detect Surveillance? {A} Formal Study of Panopticons and Their Detectability Problem}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {42}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030042}, doi = {10.3390/CRYPTOGRAPHY6030042}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LiagkouNSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LongoMMST22, author = {Riccardo Longo and Carla Mascia and Alessio Meneghetti and Giordano Santilli and Giovanni Tognolini}, title = {Adaptable Cryptographic Primitives in Blockchains via Smart Contracts}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {32}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030032}, doi = {10.3390/CRYPTOGRAPHY6030032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LongoMMST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Martinez-Rodriguez22, author = {Macarena C. Mart{\'{\i}}nez{-}Rodr{\'{\i}}guez and Luis F. Rojas{-}Mu{\~{n}}oz and Eros Camacho{-}Ruiz and Santiago S{\'{a}}nchez{-}Solano and Piedad Brox}, title = {Efficient {RO-PUF} for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {51}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040051}, doi = {10.3390/CRYPTOGRAPHY6040051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Martinez-Rodriguez22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MihailescuN22, author = {Marius Iulian Mihailescu and Stefania Loredana Nita}, title = {A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {8}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010008}, doi = {10.3390/CRYPTOGRAPHY6010008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MihailescuN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MuthavhineS22, author = {Khumbelo Difference Muthavhine and Mbuyu Sumbwanyambe}, title = {Preventing Differential Cryptanalysis Attacks Using a {KDM} Function and the 32-Bit Output S-Boxes on {AES} Algorithm Found on the Internet of Things Devices}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {11}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010011}, doi = {10.3390/CRYPTOGRAPHY6010011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MuthavhineS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NelaturuDL22, author = {Keerthi Nelaturu and Han Du and Duc{-}Phong Le}, title = {A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {18}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020018}, doi = {10.3390/CRYPTOGRAPHY6020018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NelaturuDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NisanciFY22, author = {G{\"{o}}rkem Nisanci and Paul G. Flikkema and Tolga Yal{\c{c}}in}, title = {Symmetric Cryptography on {RISC-V:} Performance Evaluation of Standardized Algorithms}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {41}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030041}, doi = {10.3390/CRYPTOGRAPHY6030041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NisanciFY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/OwenJPMD22, author = {Donald E. Owen and Jithin Joseph and Jim Plusquellic and Tom J. Mannos and Brian Dziki}, title = {Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a {RISC-V} Microprocessor}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {38}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030038}, doi = {10.3390/CRYPTOGRAPHY6030038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/OwenJPMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PatergianakisL22, author = {Antonios Patergianakis and Konstantinos Limniotis}, title = {Privacy Issues in Stylometric Methods}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {17}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020017}, doi = {10.3390/CRYPTOGRAPHY6020017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PatergianakisL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PereraNHYCS22, author = {Maharage Nisansala Sevwandi Perera and Toru Nakamura and Masayuki Hashimoto and Hiroyuki Yokoyama and Chen{-}Mou Cheng and Kouichi Sakurai}, title = {A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {3}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010003}, doi = {10.3390/CRYPTOGRAPHY6010003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PereraNHYCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PereraNHYCS22a, author = {Maharage Nisansala Sevwandi Perera and Toru Nakamura and Masayuki Hashimoto and Hiroyuki Yokoyama and Chen{-}Mou Cheng and Kouichi Sakurai}, title = {Certificate Management Scheme for VANETs Using Blockchain Structure}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {20}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020020}, doi = {10.3390/CRYPTOGRAPHY6020020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PereraNHYCS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Plusquellic22, author = {Jim Plusquellic}, title = {Shift Register, Reconvergent-Fanout (SiRF) {PUF} Implementation on an {FPGA}}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {59}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040059}, doi = {10.3390/CRYPTOGRAPHY6040059}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Plusquellic22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RadulescuC22, author = {Anca Radulescu and Marios O. Choudary}, title = {Side-Channel Attacks on Masked Bitsliced Implementations of {AES}}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {31}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030031}, doi = {10.3390/CRYPTOGRAPHY6030031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/RadulescuC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RiggsPCBRHG22, author = {Brit Riggs and Michael Partridge and Bertrand Cambou and Ian Burke and Manuel Aguilar Rios and Julie Heynssens and Dina Ghanaimiandoab}, title = {Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {36}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030036}, doi = {10.3390/CRYPTOGRAPHY6030036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/RiggsPCBRHG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SenguptaNAKS22, author = {Abhrajit Sengupta and Mohammed Nabeel and Mohammed Ashraf and Johann Knechtel and Ozgur Sinanoglu}, title = {A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the {BEOL}}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {22}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020022}, doi = {10.3390/CRYPTOGRAPHY6020022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SenguptaNAKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SerranoDSPH22, author = {Ronaldo Serrano and Ckristian Duran and Marco Sarmiento and Cong{-}Kha Pham and Trong{-}Thuc Hoang}, title = {ChaCha20-Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {30}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020030}, doi = {10.3390/CRYPTOGRAPHY6020030}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SerranoDSPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/StockPPH22, author = {Frederick Stock and Yesem Kurt Peker and Alfredo J. Perez and Jarel Hearst}, title = {Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {65}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040065}, doi = {10.3390/CRYPTOGRAPHY6040065}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/StockPPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Sujatanagarjuna22, author = {Anant Sujatanagarjuna and Arne Bochem and Benjamin Leiding}, title = {Formalizing and Safeguarding Blockchain-Based BlockVoke Protocol as an {ACME} Extension for Fast Certificate Revocation}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {63}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040063}, doi = {10.3390/CRYPTOGRAPHY6040063}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Sujatanagarjuna22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TalakiSNH22, author = {Ezinam Bertrand Talaki and Olivier Savry and Mathieu Bouvier Des Noes and David H{\'{e}}ly}, title = {A Memory Hierarchy Protected against Side-Channel Attacks}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {19}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020019}, doi = {10.3390/CRYPTOGRAPHY6020019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TalakiSNH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TsantikidouS22, author = {Kyriaki Tsantikidou and Nicolas Sklavos}, title = {Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {45}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030045}, doi = {10.3390/CRYPTOGRAPHY6030045}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TsantikidouS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/VeugenKM22, author = {Thijs Veugen and Bart Kamphorst and Michiel Marcus}, title = {Privacy-Preserving Contrastive Explanations with Local Foil Trees}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {54}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040054}, doi = {10.3390/CRYPTOGRAPHY6040054}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/VeugenKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/WangH22, author = {Chia{-}Hui Wang and Chih{-}Hao Hsu}, title = {Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {49}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040049}, doi = {10.3390/CRYPTOGRAPHY6040049}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/WangH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/WibawaCSK22, author = {Febrianti Wibawa and Ferhat {\"{O}}zg{\"{u}}r {\c{C}}atak and Salih Sarp and Murat Kuzlu}, title = {BFV-Based Homomorphic Encryption for Privacy-Preserving {CNN} Models}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {34}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030034}, doi = {10.3390/CRYPTOGRAPHY6030034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/WibawaCSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/X22, title = {Acknowledgment to Reviewers of Cryptography in 2021}, journal = {Cryptogr.}, volume = {6}, number = {1}, pages = {7}, year = {2022}, url = {https://doi.org/10.3390/cryptography6010007}, doi = {10.3390/CRYPTOGRAPHY6010007}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/X22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/YaoMZ22, author = {Jiewen Yao and Krystian Matusiewicz and Vincent Zimmer}, title = {Post Quantum Design in {SPDM} for Device Authentication and Key Establishment}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {48}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040048}, doi = {10.3390/CRYPTOGRAPHY6040048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/YaoMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZamirN22, author = {Linir Zamir and Mehrdad Nojoumian}, title = {Localized State-Change Consensus in Immense and Highly Dynamic Environments}, journal = {Cryptogr.}, volume = {6}, number = {2}, pages = {23}, year = {2022}, url = {https://doi.org/10.3390/cryptography6020023}, doi = {10.3390/CRYPTOGRAPHY6020023}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ZamirN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZengTX22, author = {Yao Zeng and Yuxi Tang and Luping Xiang}, title = {Physical Layer Security Design for Polar Code Construction}, journal = {Cryptogr.}, volume = {6}, number = {3}, pages = {35}, year = {2022}, url = {https://doi.org/10.3390/cryptography6030035}, doi = {10.3390/CRYPTOGRAPHY6030035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ZengTX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZhaoS22, author = {Guangwei Zhao and Kaveh Shamsi}, title = {Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {60}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040060}, doi = {10.3390/CRYPTOGRAPHY6040060}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ZhaoS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZhouZWC22, author = {Quan Zhou and Zhikang Zeng and Kemeng Wang and Menglong Chen}, title = {Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection}, journal = {Cryptogr.}, volume = {6}, number = {4}, pages = {64}, year = {2022}, url = {https://doi.org/10.3390/cryptography6040064}, doi = {10.3390/CRYPTOGRAPHY6040064}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/ZhouZWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AerabiHBPF21, author = {Ehsan Aerabi and David H{\'{e}}ly and Cyril Bresch and Athanasios Papadimitriou and Mahdi Fazeli}, title = {{CONFISCA:} An SIMD-Based Concurrent {FI} and {SCA} Countermeasure with Switchable Performance and Security Modes}, journal = {Cryptogr.}, volume = {5}, number = {2}, pages = {13}, year = {2021}, url = {https://doi.org/10.3390/cryptography5020013}, doi = {10.3390/CRYPTOGRAPHY5020013}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AerabiHBPF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlabdullahBW21, author = {Bayan Ibrahimm Alabdullah and Natalia Beloff and Martin White}, title = {{E-ART:} {A} New Encryption Algorithm Based on the Reflection of Binary Search Tree}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {4}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010004}, doi = {10.3390/CRYPTOGRAPHY5010004}, timestamp = {Wed, 06 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/AlabdullahBW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlzakariV21, author = {Sarah A. Alzakari and Poorvi L. Vora}, title = {Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {1}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010001}, doi = {10.3390/CRYPTOGRAPHY5010001}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlzakariV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AmarasingheBM21, author = {Niluka Amarasinghe and Xavier Boyen and Matthew McKague}, title = {The Cryptographic Complexity of Anonymous Coins: {A} Systematic Exploration}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {10}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010010}, doi = {10.3390/CRYPTOGRAPHY5010010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AmarasingheBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AnagrehLV21, author = {Mohammad Anagreh and Peeter Laud and Eero Vainikko}, title = {Parallel Privacy-Preserving Shortest Path Algorithms}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {27}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040027}, doi = {10.3390/CRYPTOGRAPHY5040027}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/AnagrehLV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BalamuruganSGR21, author = {Chithralekha Balamurugan and Kalpana Singh and Ganeshvani Ganesan and Muttukrishnan Rajarajan}, title = {Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {38}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040038}, doi = {10.3390/CRYPTOGRAPHY5040038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BalamuruganSGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BelliziaSS21, author = {Davide Bellizia and Riccardo Della Sala and Giuseppe Scotti}, title = {{SC-DDPL} as a Countermeasure against Static Power Side-Channel Attacks}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {16}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030016}, doi = {10.3390/CRYPTOGRAPHY5030016}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BelliziaSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BoyenHMS21, author = {Xavier Boyen and Udyani Herath and Matthew McKague and Douglas Stebila}, title = {Associative Blockchain for Decentralized {PKI} Transparency}, journal = {Cryptogr.}, volume = {5}, number = {2}, pages = {14}, year = {2021}, url = {https://doi.org/10.3390/cryptography5020014}, doi = {10.3390/CRYPTOGRAPHY5020014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BoyenHMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BudroniGJMW21, author = {Alessandro Budroni and Qian Guo and Thomas Johansson and Erik M{\aa}rtensson and Paul Stankovski Wagner}, title = {Improvements on Making {BKW} Practical for Solving {LWE}}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {31}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040031}, doi = {10.3390/CRYPTOGRAPHY5040031}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BudroniGJMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CambouTAGJP21, author = {Bertrand Cambou and Donald Telesca and Sareh Assiri and Michael Garrett and Saloni Jain and Michael Partridge}, title = {TRNGs from Pre-Formed ReRAM Arrays}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {8}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010008}, doi = {10.3390/CRYPTOGRAPHY5010008}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CambouTAGJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChenMG21, author = {Yu{-}Cheng Chen and Vincent John Mooney and Santiago Grijalva}, title = {Grid Cyber-Security Strategy in an Attacker-Defender Model}, journal = {Cryptogr.}, volume = {5}, number = {2}, pages = {12}, year = {2021}, url = {https://doi.org/10.3390/cryptography5020012}, doi = {10.3390/CRYPTOGRAPHY5020012}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ChenMG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChongS21, author = {Bang Yuan Chong and Iftekhar Salam}, title = {Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {30}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040030}, doi = {10.3390/CRYPTOGRAPHY5040030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ChongS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CojocaruCKW21, author = {Alexandru Cojocaru and L{\'{e}}o Colisson and Elham Kashefi and Petros Wallden}, title = {On the Possibility of Classical Client Blind Quantum Computing}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {3}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010003}, doi = {10.3390/CRYPTOGRAPHY5010003}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CojocaruCKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DannerK21, author = {Julian Danner and Martin Kreuzer}, title = {A Fault Attack on the Family of Enocoro Stream Ciphers}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {26}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040026}, doi = {10.3390/CRYPTOGRAPHY5040026}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DannerK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/El-AttarEA21, author = {Noha Ezzat El{-}Attar and Doaa S. El{-}Morshedy and Wael A. Awad}, title = {A New Hybrid Automated Security Framework to Cloud Storage System}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {37}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040037}, doi = {10.3390/CRYPTOGRAPHY5040037}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/El-AttarEA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FreudenbergerT21, author = {J{\"{u}}rgen Freudenberger and Johann{-}Philipp Thiers}, title = {A New Class of Q-Ary Codes for the McEliece Cryptosystem}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {11}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010011}, doi = {10.3390/CRYPTOGRAPHY5010011}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FreudenbergerT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GordonEGYKT21, author = {Holden Gordon and Jack Edmonds and Soroor Ghandali and Wei Yan and Nima Karimian and Fatemeh Tehranipoor}, title = {Flash-Based Security Primitives: Evolution, Challenges and Future Directions}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {7}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010007}, doi = {10.3390/CRYPTOGRAPHY5010007}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GordonEGYKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GrycelS21, author = {Jacob T. Grycel and Patrick Schaumont}, title = {SimpliFI: Hardware Simulation of Embedded Software Fault Attacks}, journal = {Cryptogr.}, volume = {5}, number = {2}, pages = {15}, year = {2021}, url = {https://doi.org/10.3390/cryptography5020015}, doi = {10.3390/CRYPTOGRAPHY5020015}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GrycelS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GuiBHS21, author = {Yutian Gui and Chaitanya Bhure and Marcus Hughes and Fareena Saqib}, title = {A Delay-Based Machine Learning Model for {DMA} Attack Mitigation}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {18}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030018}, doi = {10.3390/CRYPTOGRAPHY5030018}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/GuiBHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HamadaqaMAB21, author = {Emad Hamadaqa and Saleh Mulhem and Wael Adi and Mladen Berekovic}, title = {Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {32}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040032}, doi = {10.3390/CRYPTOGRAPHY5040032}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HamadaqaMAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/IoannidouS21, author = {Irene Ioannidou and Nicolas Sklavos}, title = {On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {29}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040029}, doi = {10.3390/CRYPTOGRAPHY5040029}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/IoannidouS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KleinHL21, author = {Netanel Klein and Eyal Harel and Itamar Levi}, title = {The Cost of a True Random Bit - On the Electronic Cost Gain of {ASIC} Time-Domain-Based TRNGs}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {25}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030025}, doi = {10.3390/CRYPTOGRAPHY5030025}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/KleinHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LaurP21, author = {Sven Laur and Pille Pullonen{-}Raudvere}, title = {Foundations of Programmable Secure Computation}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {22}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030022}, doi = {10.3390/CRYPTOGRAPHY5030022}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/LaurP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Limniotis21, author = {Konstantinos Limniotis}, title = {Cryptography as the Means to Protect Fundamental Human Rights}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {34}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040034}, doi = {10.3390/CRYPTOGRAPHY5040034}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Limniotis21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MohammedAB21, author = {Kabiru Mohammed and Aladdin Ayesh and Eerke A. Boiten}, title = {Complementing Privacy and Utility Trade-Off with Self-Organising Maps}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {20}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030020}, doi = {10.3390/CRYPTOGRAPHY5030020}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/MohammedAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/OnoM21, author = {Hibiki Ono and Yoshifumi Manabe}, title = {Minimum Round Card-Based Cryptographic Protocols Using Private Operations}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {17}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030017}, doi = {10.3390/CRYPTOGRAPHY5030017}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/OnoM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/OstrakRSLK21, author = {Andre Ostrak and Jaak Randmets and Ville Sokk and Sven Laur and Liina Kamm}, title = {Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {21}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030021}, doi = {10.3390/CRYPTOGRAPHY5030021}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/OstrakRSLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RomanoS21, author = {Diego Romano and Giovanni Schmid}, title = {Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {36}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040036}, doi = {10.3390/CRYPTOGRAPHY5040036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/RomanoS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SafiehF21, author = {Malek Safieh and J{\"{u}}rgen Freudenberger}, title = {Montgomery Reduction for Gaussian Integers}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {6}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010006}, doi = {10.3390/CRYPTOGRAPHY5010006}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SafiehF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SahaK21, author = {Tushar Kanti Saha and Takeshi Koshiba}, title = {Efficient Private Conjunctive Query Protocol Over Encrypted Data}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {2}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010002}, doi = {10.3390/CRYPTOGRAPHY5010002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SahaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SalaBS21, author = {Riccardo Della Sala and Davide Bellizia and Giuseppe Scotti}, title = {A Novel Ultra-Compact {FPGA} {PUF:} The {DD-PUF}}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {23}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030023}, doi = {10.3390/CRYPTOGRAPHY5030023}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SalaBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SalomonWL21, author = {Dor Salomon and Amir Weiss and Itamar Levi}, title = {Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {24}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030024}, doi = {10.3390/CRYPTOGRAPHY5030024}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SalomonWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SathiaseelanPTA21, author = {Mukhil Azhagan Mallaiyan Sathiaseelan and Olivia P. Paradis and Shayan Taheri and Navid Asadizanjani}, title = {Why Is Deep Learning Challenging for Printed Circuit Board {(PCB)} Component Recognition and How Can We Address It?}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {9}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010009}, doi = {10.3390/CRYPTOGRAPHY5010009}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SathiaseelanPTA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SayadiGMLCRH21, author = {Hossein Sayadi and Yifeng Gao and Hosein Mohammadi Makrani and Jessica Lin and Paulo Cesar G. da Costa and Setareh Rafatirad and Houman Homayoun}, title = {Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: {A} Lightweight, yet Effective Time Series CNN-Based Approach}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {28}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040028}, doi = {10.3390/CRYPTOGRAPHY5040028}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SayadiGMLCRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Seo21, author = {Minhye Seo}, title = {Fair and Secure Multi-Party Computation with Cheater Detection}, journal = {Cryptogr.}, volume = {5}, number = {3}, pages = {19}, year = {2021}, url = {https://doi.org/10.3390/cryptography5030019}, doi = {10.3390/CRYPTOGRAPHY5030019}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Seo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SuvidhaRKL21, author = {K. S. Suvidha and Jothi Rangasamy and Shyam S. Kamath and Cheng{-}Chi Lee}, title = {{ES-HAS:} ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {35}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040035}, doi = {10.3390/CRYPTOGRAPHY5040035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SuvidhaRKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ThiersF21, author = {Johann{-}Philipp Thiers and J{\"{u}}rgen Freudenberger}, title = {Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography}, journal = {Cryptogr.}, volume = {5}, number = {4}, pages = {33}, year = {2021}, url = {https://doi.org/10.3390/cryptography5040033}, doi = {10.3390/CRYPTOGRAPHY5040033}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/ThiersF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/X21, title = {Acknowledgment to Reviewers of Cryptography in 2020}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {5}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010005}, doi = {10.3390/CRYPTOGRAPHY5010005}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Abidin20, author = {Aysajan Abidin}, title = {On Detecting Relay Attacks on {RFID} Systems Using Qubits}, journal = {Cryptogr.}, volume = {4}, number = {2}, pages = {14}, year = {2020}, url = {https://doi.org/10.3390/cryptography4020014}, doi = {10.3390/CRYPTOGRAPHY4020014}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Abidin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlagicJOP20, author = {Gorjan Alagic and Stacey Jeffery and Maris Ozols and Alexander Poremba}, title = {On Quantum Chosen-Ciphertext Attacks and Learning with Errors}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {10}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010010}, doi = {10.3390/CRYPTOGRAPHY4010010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlagicJOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlmukhlifiV20, author = {Reham Almukhlifi and Poorvi L. Vora}, title = {Linear Cryptanalysis of Reduced-Round Simon Using Super Rounds}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {9}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010009}, doi = {10.3390/CRYPTOGRAPHY4010009}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlmukhlifiV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BezzateevDO20, author = {Sergey Bezzateev and Vadim Davydov and Aleksandr Ometov}, title = {On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {34}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040034}, doi = {10.3390/CRYPTOGRAPHY4040034}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BezzateevDO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BowBSCPRCP20, author = {Ivan Bow and Nahome Bete and Fareena Saqib and Wenjie Che and Chintan Patel and Ryan W. Robucci and Calvin Chan and Jim Plusquellic}, title = {Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity}, journal = {Cryptogr.}, volume = {4}, number = {2}, pages = {13}, year = {2020}, url = {https://doi.org/10.3390/cryptography4020013}, doi = {10.3390/CRYPTOGRAPHY4020013}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BowBSCPRCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BreuerL20, author = {Rinat Breuer and Itamar Levi}, title = {How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security Evaluation and its Cost}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {36}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040036}, doi = {10.3390/CRYPTOGRAPHY4040036}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BreuerL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CambouGHJPBBGTN20, author = {Bertrand Cambou and Michael Gowanlock and Julie Heynssens and Saloni Jain and Christopher Robert Philabaum and Duane Booher and Ian Burke and Jack Garrard and Donald Telesca and Laurent Njilla}, title = {Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions}, journal = {Cryptogr.}, volume = {4}, number = {2}, pages = {17}, year = {2020}, url = {https://doi.org/10.3390/cryptography4020017}, doi = {10.3390/CRYPTOGRAPHY4020017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CambouGHJPBBGTN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CockellH20, author = {Robert Cockell and Basel Halak}, title = {On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics}, journal = {Cryptogr.}, volume = {4}, number = {2}, pages = {12}, year = {2020}, url = {https://doi.org/10.3390/cryptography4020012}, doi = {10.3390/CRYPTOGRAPHY4020012}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CockellH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CowperST20, author = {Noah Cowper and Harry C. Shaw and David R. Thayer}, title = {Chaotic Quantum Key Distribution}, journal = {Cryptogr.}, volume = {4}, number = {3}, pages = {24}, year = {2020}, url = {https://doi.org/10.3390/cryptography4030024}, doi = {10.3390/CRYPTOGRAPHY4030024}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/CowperST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DasS20, author = {Debayan Das and Shreyas Sen}, title = {Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {30}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040030}, doi = {10.3390/CRYPTOGRAPHY4040030}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DasS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Dwivedi20, author = {Ashutosh Dhar Dwivedi}, title = {Security Analysis of Lightweight IoT Cipher: Chaskey}, journal = {Cryptogr.}, volume = {4}, number = {3}, pages = {22}, year = {2020}, url = {https://doi.org/10.3390/cryptography4030022}, doi = {10.3390/CRYPTOGRAPHY4030022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Dwivedi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/EvsutinD20, author = {Oleg Evsutin and Kristina Dzhanashia}, title = {Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {35}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040035}, doi = {10.3390/CRYPTOGRAPHY4040035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/EvsutinD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GuilleyKPSST20, author = {Sylvain Guilley and Khaled Karray and Thomas Perianin and Ritu Ranjan Shrivastwa and Youssef Souissi and Sofiane Takarabt}, title = {Side-Channel Evaluation Methodology on Software}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {27}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040027}, doi = {10.3390/CRYPTOGRAPHY4040027}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GuilleyKPSST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HamadaqaMA20, author = {Emad Hamadaqa and Ayoub Mars and Wael Adi}, title = {Physical Security for Fleet Management Systems}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {1}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010001}, doi = {10.3390/CRYPTOGRAPHY4010001}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HamadaqaMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HeoKYPH20, author = {Donghoe Heo and Suhri Kim and Kisoon Yoon and Young{-}Ho Park and Seokhie Hong}, title = {Optimized {CSIDH} Implementation Using a 2-Torsion Point}, journal = {Cryptogr.}, volume = {4}, number = {3}, pages = {20}, year = {2020}, url = {https://doi.org/10.3390/cryptography4030020}, doi = {10.3390/CRYPTOGRAPHY4030020}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HeoKYPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Jarpe20, author = {Eric J{\"{a}}rpe}, title = {An Alternative Diffie-Hellman Protocol}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {5}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010005}, doi = {10.3390/CRYPTOGRAPHY4010005}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Jarpe20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JimboIR20, author = {Koki Jimbo and Satoshi Iriyama and Massimo Regoli}, title = {Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization}, journal = {Cryptogr.}, volume = {4}, number = {3}, pages = {21}, year = {2020}, url = {https://doi.org/10.3390/cryptography4030021}, doi = {10.3390/CRYPTOGRAPHY4030021}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/JimboIR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KiharaI20, author = {Maki Kihara and Satoshi Iriyama}, title = {Security and Performance of Single Sign-on Based on One-Time Pad Algorithm}, journal = {Cryptogr.}, volume = {4}, number = {2}, pages = {16}, year = {2020}, url = {https://doi.org/10.3390/cryptography4020016}, doi = {10.3390/CRYPTOGRAPHY4020016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KiharaI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LiangBM20, author = {Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa}, title = {Statically Aggregate Verifiable Random Functions and Application to E-Lottery}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {37}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040037}, doi = {10.3390/CRYPTOGRAPHY4040037}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LiangBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MahmodG20, author = {Md Jubayer al Mahmod and Ujjwal Guin}, title = {A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {8}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010008}, doi = {10.3390/CRYPTOGRAPHY4010008}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MahmodG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MarkhamK20, author = {Damian Markham and Alexandra Krause}, title = {A Simple Protocol for Certifying Graph States and Applications in Quantum Networks}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {3}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010003}, doi = {10.3390/CRYPTOGRAPHY4010003}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MarkhamK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MartinP20, author = {Mitchell T. Martin and Jim Plusquellic}, title = {NotchPUF: Printed Circuit Board {PUF} Based on Microstrip Notch Filter}, journal = {Cryptogr.}, volume = {4}, number = {2}, pages = {11}, year = {2020}, url = {https://doi.org/10.3390/cryptography4020011}, doi = {10.3390/CRYPTOGRAPHY4020011}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MartinP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MazzarellaLLJGM20, author = {Luca Mazzarella and Christopher John Lowe and David Lowndes and Siddarth Koduru Joshi and Steve Greenland and Doug McNeil and Cassandra Mercury and Malcolm Macdonald and John G. Rarity and Daniel Kuan Li Oi}, title = {{QUARC:} Quantum Research Cubesat - {A} Constellation for Quantum Communication}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {7}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010007}, doi = {10.3390/CRYPTOGRAPHY4010007}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MazzarellaLLJGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MulhemMA20, author = {Saleh Mulhem and Ayoub Mars and Wael Adi}, title = {Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {6}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010006}, doi = {10.3390/CRYPTOGRAPHY4010006}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MulhemMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NijsseL20, author = {Jeff Nijsse and Alan T. Litchfield}, title = {A Taxonomy of Blockchain Consensus Methods}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {32}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040032}, doi = {10.3390/CRYPTOGRAPHY4040032}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NijsseL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NikolopoulosF20, author = {Georgios M. Nikolopoulos and Marc Fischlin}, title = {Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {31}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040031}, doi = {10.3390/CRYPTOGRAPHY4040031}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NikolopoulosF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PereraK20, author = {Maharage Nisansala Sevwandi Perera and Takeshi Koshiba}, title = {Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {33}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040033}, doi = {10.3390/CRYPTOGRAPHY4040033}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PereraK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RandolphD20, author = {Mark Randolph and William Diehl}, title = {Power Side-Channel Attack Analysis: {A} Review of 20 Years of Study for the Layman}, journal = {Cryptogr.}, volume = {4}, number = {2}, pages = {15}, year = {2020}, url = {https://doi.org/10.3390/cryptography4020015}, doi = {10.3390/CRYPTOGRAPHY4020015}, timestamp = {Tue, 07 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/RandolphD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SamanthulaKDK20, author = {Bharath K. Samanthula and Divya Karthikeyan and Boxiang Dong and K. Anitha Kumari}, title = {{ESPADE:} An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {29}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040029}, doi = {10.3390/CRYPTOGRAPHY4040029}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SamanthulaKDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SauerA20, author = {Alexander Sauer and Gernot Alber}, title = {Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {2}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010002}, doi = {10.3390/CRYPTOGRAPHY4010002}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SauerA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SiddiquiGS20, author = {Ali Shuja Siddiqui and Yutian Gui and Fareena Saqib}, title = {Secure Boot for Reconfigurable Architectures}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {26}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040026}, doi = {10.3390/CRYPTOGRAPHY4040026}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/SiddiquiGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Sugawara20, author = {Takeshi Sugawara}, title = {Hardware Performance Evaluation of Authenticated Encryption {SAEAES} with Threshold Implementation}, journal = {Cryptogr.}, volume = {4}, number = {3}, pages = {23}, year = {2020}, url = {https://doi.org/10.3390/cryptography4030023}, doi = {10.3390/CRYPTOGRAPHY4030023}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Sugawara20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TahaHSVVAD20, author = {Mohammed Abu Taha and Wassim Hamidouche and Naty Sidaty and Marko Viitanen and Jarno Vanne and Safwan El Assad and Olivier D{\'{e}}forges}, title = {Privacy Protection in Real Time {HEVC} Standard Using Chaotic System}, journal = {Cryptogr.}, volume = {4}, number = {2}, pages = {18}, year = {2020}, url = {https://doi.org/10.3390/cryptography4020018}, doi = {10.3390/CRYPTOGRAPHY4020018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TahaHSVVAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TayachiMANPB20, author = {Mayssa Tayachi and Saleh Mulhem and Wael Adi and Laurent Nana and Anca Pascu and Faouzi Benzarti}, title = {Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems}, journal = {Cryptogr.}, volume = {4}, number = {3}, pages = {19}, year = {2020}, url = {https://doi.org/10.3390/cryptography4030019}, doi = {10.3390/CRYPTOGRAPHY4030019}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/TayachiMANPB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TsaloliBM20, author = {Georgia Tsaloli and Gustavo Banegas and Aikaterini Mitrokotsa}, title = {Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing}, journal = {Cryptogr.}, volume = {4}, number = {3}, pages = {25}, year = {2020}, url = {https://doi.org/10.3390/cryptography4030025}, doi = {10.3390/CRYPTOGRAPHY4030025}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TsaloliBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/X20, title = {Acknowledgement to Reviewers of Cryptography in 2019}, journal = {Cryptogr.}, volume = {4}, number = {1}, pages = {4}, year = {2020}, url = {https://doi.org/10.3390/cryptography4010004}, doi = {10.3390/CRYPTOGRAPHY4010004}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/X20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZhouZW20, author = {Yunhong Zhou and Shihui Zheng and Licheng Wang}, title = {Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on {CP-ABE} in Cloud}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {28}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040028}, doi = {10.3390/CRYPTOGRAPHY4040028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ZhouZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AccardiIJR19, author = {Luigi Accardi and Satoshi Iriyama and Koki Jimbo and Massimo Regoli}, title = {A New Class of Strongly Asymmetric {PKA} Algorithms: {SAA-5}}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {9}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010009}, doi = {10.3390/CRYPTOGRAPHY3010009}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AccardiIJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AriffinAYA19, author = {Muhammad Rezal Kamel Ariffin and Saidu Isah Abubakar and Faridah Yunos and Muhammad Asyraf Asbullah}, title = {New Cryptanalytic Attack on {RSA} Modulus \emph{N} = \emph{pq} Using Small Prime Difference Method}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {2}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010002}, doi = {10.3390/CRYPTOGRAPHY3010002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AriffinAYA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CalhounMHSCP19, author = {Jeff Calhoun and Cyrus Minwalla and Charles Helmich and Fareena Saqib and Wenjie Che and Jim Plusquellic}, title = {Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {18}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030018}, doi = {10.3390/CRYPTOGRAPHY3030018}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CalhounMHSCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CampagnaG19, author = {Matthew Campagna and Shay Gueron}, title = {Key Management Systems at the Cloud Scale}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {23}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030023}, doi = {10.3390/CRYPTOGRAPHY3030023}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CampagnaG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChingY19, author = {Sally Lin Pei Ching and Faridah Yunos}, title = {Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction}, journal = {Cryptogr.}, volume = {3}, number = {2}, pages = {15}, year = {2019}, url = {https://doi.org/10.3390/cryptography3020015}, doi = {10.3390/CRYPTOGRAPHY3020015}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ChingY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Chung0LZ19, author = {Kai{-}Min Chung and Marios Georgiou and Ching{-}Yi Lai and Vassilis Zikas}, title = {Cryptography with Disposable Backdoors}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {22}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030022}, doi = {10.3390/CRYPTOGRAPHY3030022}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Chung0LZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CoyleKH19, author = {Brian Coyle and Elham Kashefi and Matty J. Hoban}, title = {Certified Randomness From Steering Using Sequential Measurements}, journal = {Cryptogr.}, volume = {3}, number = {4}, pages = {27}, year = {2019}, url = {https://doi.org/10.3390/cryptography3040027}, doi = {10.3390/CRYPTOGRAPHY3040027}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CoyleKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Dehnavi19, author = {Seyed Mojtaba Dehnavi}, title = {Further Observations on {SIMON} and {SPECK} Block Cipher Families}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {1}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010001}, doi = {10.3390/CRYPTOGRAPHY3010001}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Dehnavi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DwivediDSS19, author = {Ashutosh Dhar Dwivedi and Shalini Dhar and Gautam Srivastava and Rajani Singh}, title = {Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {4}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010004}, doi = {10.3390/CRYPTOGRAPHY3010004}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/DwivediDSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FladungNAF19, author = {Lukas Fladung and Georgios M. Nikolopoulos and Gernot Alber and Marc Fischlin}, title = {Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys}, journal = {Cryptogr.}, volume = {3}, number = {4}, pages = {25}, year = {2019}, url = {https://doi.org/10.3390/cryptography3040025}, doi = {10.3390/CRYPTOGRAPHY3040025}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FladungNAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HaiderD19, author = {Syed Kamran Haider and Marten van Dijk}, title = {Flat {ORAM:} {A} Simplified Write-Only Oblivious {RAM} Construction for Secure Processors}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {10}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010010}, doi = {10.3390/CRYPTOGRAPHY3010010}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HaiderD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JoshiB19, author = {Karuna Pande Joshi and Agniva Banerjee}, title = {Automating Privacy Compliance Using Policy Integrated Blockchain}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {7}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010007}, doi = {10.3390/CRYPTOGRAPHY3010007}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/JoshiB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KiharaI19, author = {Maki Kihara and Satoshi Iriyama}, title = {New Authentication Algorithm Based on Verifiable Encryption with Digital Identity}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {19}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030019}, doi = {10.3390/CRYPTOGRAPHY3030019}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KiharaI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Kumar19, author = {Niraj Kumar}, title = {Practically Feasible Robust Quantum Money with Classical Verification}, journal = {Cryptogr.}, volume = {3}, number = {4}, pages = {26}, year = {2019}, url = {https://doi.org/10.3390/cryptography3040026}, doi = {10.3390/CRYPTOGRAPHY3040026}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Kumar19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Luyen19, author = {Le Van Luyen}, title = {An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {8}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010008}, doi = {10.3390/CRYPTOGRAPHY3010008}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Luyen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MarsA19, author = {Ayoub Mars and Wael Adi}, title = {New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures}, journal = {Cryptogr.}, volume = {3}, number = {2}, pages = {11}, year = {2019}, url = {https://doi.org/10.3390/cryptography3020011}, doi = {10.3390/CRYPTOGRAPHY3020011}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MarsA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Mehrabi19, author = {Mohamad Ali Mehrabi}, title = {Improved Sum of Residues Modular Multiplication Algorithm}, journal = {Cryptogr.}, volume = {3}, number = {2}, pages = {14}, year = {2019}, url = {https://doi.org/10.3390/cryptography3020014}, doi = {10.3390/CRYPTOGRAPHY3020014}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Mehrabi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MohammedY19, author = {Alzahraa J. Mohammed and Ali A. Yassin}, title = {Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {24}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030024}, doi = {10.3390/CRYPTOGRAPHY3030024}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MohammedY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/MulhemA19, author = {Saleh Mulhem and Wael Adi}, title = {New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant {FPGA} Devices}, journal = {Cryptogr.}, volume = {3}, number = {4}, pages = {28}, year = {2019}, url = {https://doi.org/10.3390/cryptography3040028}, doi = {10.3390/CRYPTOGRAPHY3040028}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/MulhemA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NaseerSSH19, author = {Yasir Naseer and Tariq Shah and Dawood Shah and Sadam Hussain}, title = {A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {6}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010006}, doi = {10.3390/CRYPTOGRAPHY3010006}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NaseerSSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Office19, title = {Acknowledgement to Reviewers of \emph{Cryptography} in 2018}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {5}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010005}, doi = {10.3390/CRYPTOGRAPHY3010005}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Office19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PhadikarJM19, author = {Amit Phadikar and Poulami Jana and Himadri S. Mandal}, title = {Reversible Data Hiding for {DICOM} Image Using Lifting and Companding}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {21}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030021}, doi = {10.3390/CRYPTOGRAPHY3030021}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PhadikarJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/QuadirC19, author = {Md Shahed Enamul Quadir and John A. Chandy}, title = {Key Generation for Hardware Obfuscation Using Strong PUFs}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {17}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030017}, doi = {10.3390/CRYPTOGRAPHY3030017}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/QuadirC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SeneCN19, author = {Ibou Sene and Abdoul Aziz Ciss and Oumar Niang}, title = {{I2PA:} An Efficient {ABC} for IoT}, journal = {Cryptogr.}, volume = {3}, number = {2}, pages = {16}, year = {2019}, url = {https://doi.org/10.3390/cryptography3020016}, doi = {10.3390/CRYPTOGRAPHY3020016}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SeneCN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ShahQ19, author = {Tariq Shah and Ayesha Qureshi}, title = {S-Box on Subgroup of Galois Field}, journal = {Cryptogr.}, volume = {3}, number = {2}, pages = {13}, year = {2019}, url = {https://doi.org/10.3390/cryptography3020013}, doi = {10.3390/CRYPTOGRAPHY3020013}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ShahQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SiyalJZAKS19, author = {Asad Ali Siyal and Aisha Zahid Junejo and Muhammad Zawish and Kainat Ahmed and Aiman Khalil and Georgia Soursou}, title = {Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives}, journal = {Cryptogr.}, volume = {3}, number = {1}, pages = {3}, year = {2019}, url = {https://doi.org/10.3390/cryptography3010003}, doi = {10.3390/CRYPTOGRAPHY3010003}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SiyalJZAKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/TiwariKAM19, author = {Bhupendra Nath Tiwari and Jude Kibinde Kuipo and Joshua Muyiwa Adeegbe and Ninoslav Marina}, title = {Optimized {AKS} Primality Testing: {A} Fluctuation Theory Perspective}, journal = {Cryptogr.}, volume = {3}, number = {2}, pages = {12}, year = {2019}, url = {https://doi.org/10.3390/cryptography3020012}, doi = {10.3390/CRYPTOGRAPHY3020012}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/TiwariKAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/VenkatramanO19, author = {Sitalakshmi Venkatraman and Anthony Overmars}, title = {New Method of Prime Factorisation-Based Attacks on {RSA} Authentication in IoT}, journal = {Cryptogr.}, volume = {3}, number = {3}, pages = {20}, year = {2019}, url = {https://doi.org/10.3390/cryptography3030020}, doi = {10.3390/CRYPTOGRAPHY3030020}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/VenkatramanO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AgrawalCK18, author = {Megha Agrawal and Donghoon Chang and Jinkeon Kang}, title = {Deterministic Authenticated Encryption Scheme for Memory Constrained Devices}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {37}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040037}, doi = {10.3390/CRYPTOGRAPHY2040037}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AgrawalCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlvanosLS18, author = {Dimitrios Alvanos and Konstantinos Limniotis and Stavros Stavrou}, title = {On the Cryptographic Features of a VoIP Service}, journal = {Cryptogr.}, volume = {2}, number = {1}, pages = {3}, year = {2018}, url = {https://doi.org/10.3390/cryptography2010003}, doi = {10.3390/CRYPTOGRAPHY2010003}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlvanosLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Anagnostopoulos18, author = {Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser and John A. Chandy and Fatemeh Tehranipoor}, title = {An Overview of DRAM-Based Security Primitives}, journal = {Cryptogr.}, volume = {2}, number = {2}, pages = {7}, year = {2018}, url = {https://doi.org/10.3390/cryptography2020007}, doi = {10.3390/CRYPTOGRAPHY2020007}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Anagnostopoulos18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Anagnostopoulos18a, author = {Nikolaos Athanasios Anagnostopoulos and Tolga Arul and Yufan Fan and Christian Hatzfeld and Andr{\'{e}} Schaller and Wenjie Xiong and Manishkumar Jain and Muhammad Umair Saleem and Jan Lotichius and Sebastian Gabmeyer and Jakub Szefer and Stefan Katzenbeisser}, title = {Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security \({}^{\mbox{{\textdagger}}}\)}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {13}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030013}, doi = {10.3390/CRYPTOGRAPHY2030013}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Anagnostopoulos18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BaurB18, author = {Sebastian Baur and Holger Boche}, title = {Robust Secure Authentication and Data Storage with Perfect Secrecy}, journal = {Cryptogr.}, volume = {2}, number = {2}, pages = {8}, year = {2018}, url = {https://doi.org/10.3390/cryptography2020008}, doi = {10.3390/CRYPTOGRAPHY2020008}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BaurB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BoyenH18, author = {Xavier Boyen and Thomas Haines}, title = {Forward-Secure Linkable Ring Signatures from Bilinear Maps}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {35}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040035}, doi = {10.3390/CRYPTOGRAPHY2040035}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BoyenH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CambouFPTP18, author = {Bertrand Cambou and Paul G. Flikkema and James Palmer and Donald Telesca and Christopher Robert Philabaum}, title = {Can Ternary Computing Improve Information Assurance?}, journal = {Cryptogr.}, volume = {2}, number = {1}, pages = {6}, year = {2018}, url = {https://doi.org/10.3390/cryptography2010006}, doi = {10.3390/CRYPTOGRAPHY2010006}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CambouFPTP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CasalRS18, author = {Filipe Casal and Jo{\~{a}}o Rasga and Andr{\'{e}} Souto}, title = {Kolmogorov One-Way Functions Revisited}, journal = {Cryptogr.}, volume = {2}, number = {2}, pages = {9}, year = {2018}, url = {https://doi.org/10.3390/cryptography2020009}, doi = {10.3390/CRYPTOGRAPHY2020009}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CasalRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChandrasekaranB18, author = {Balaji Chandrasekaran and Ramadoss Balakrishnan}, title = {An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {14}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030014}, doi = {10.3390/CRYPTOGRAPHY2030014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ChandrasekaranB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChangHJ18, author = {Joy Jo{-}Yi Chang and Bo{-}Yuan Huang and Justie Su{-}tzu Juan}, title = {A New Visual Multi-Secrets Sharing Scheme by Random Grids}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {24}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030024}, doi = {10.3390/CRYPTOGRAPHY2030024}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/ChangHJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ChenHJ18, author = {Ying{-}Yu Chen and Bo{-}Yuan Huang and Justie Su{-}tzu Juan}, title = {A (\emph{k}, \emph{n})-Threshold Progressive Visual Secret Sharing without Expansion}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {28}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040028}, doi = {10.3390/CRYPTOGRAPHY2040028}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/ChenHJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DangerHFGGHNPS18, author = {Jean{-}Luc Danger and Youssef El Housni and Adrien Facon and Cheikh Thiecoumba Gueye and Sylvain Guilley and Sylvie Herbel and Ousmane Ndiaye and Edoardo Persichetti and Alexander Schaub}, title = {On the Performance and Security of Multiplication in \emph{GF}(2\({}^{\mbox{\emph{N}}}\))}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {25}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030025}, doi = {10.3390/CRYPTOGRAPHY2030025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DangerHFGGHNPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/DiehlAFKG18, author = {William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens{-}Peter Kaps and Kris Gaj}, title = {Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {26}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030026}, doi = {10.3390/CRYPTOGRAPHY2030026}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/DiehlAFKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FeF18, author = {Sadiel de la Fe and Carles Ferrer}, title = {A Secure Algorithm for Inversion Modulo 2\({}^{\mbox{\emph{k}}}\)}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {23}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030023}, doi = {10.3390/CRYPTOGRAPHY2030023}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FeF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/FroystadTJ18, author = {Christian Fr{\o}ystad and Inger Anne T{\o}ndel and Martin Gilje Jaatun}, title = {Security Incident Information Exchange for Cloud Service Provisioning Chains}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {41}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040041}, doi = {10.3390/CRYPTOGRAPHY2040041}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/FroystadTJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GandinoMR18, author = {Filippo Gandino and Bartolomeo Montrucchio and Maurizio Rebaudengo}, title = {Redundancy in Key Management for WSNs}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {40}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040040}, doi = {10.3390/CRYPTOGRAPHY2040040}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GandinoMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GuoDT18, author = {Yunxi Guo and Timothy Dee and Akhilesh Tyagi}, title = {Barrel Shifter Physical Unclonable Function Based Encryption}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {22}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030022}, doi = {10.3390/CRYPTOGRAPHY2030022}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GuoDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HanW18, author = {Jialuo Han and Jidong Wang}, title = {An Enhanced Key Management Scheme for LoRaWAN}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {34}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040034}, doi = {10.3390/CRYPTOGRAPHY2040034}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HanW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Hirose18, author = {Shoichi Hirose}, title = {Sequential Hashing with Minimum Padding}, journal = {Cryptogr.}, volume = {2}, number = {2}, pages = {11}, year = {2018}, url = {https://doi.org/10.3390/cryptography2020011}, doi = {10.3390/CRYPTOGRAPHY2020011}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Hirose18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/HuLCL18, author = {Ziyuan Hu and Shengli Liu and Kefei Chen and Joseph K. Liu}, title = {Revocable Identity-Based Encryption and Server-Aided Revocable {IBE} from the Computational Diffie-Hellman Assumption}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {33}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040033}, doi = {10.3390/CRYPTOGRAPHY2040033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/HuLCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JamesGR18, author = {Salome James and N. B. Gayathri and Punugu Vasudeva Reddy}, title = {Pairing Free Identity-Based Blind Signature Scheme with Message Recovery}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {29}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040029}, doi = {10.3390/CRYPTOGRAPHY2040029}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/JamesGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KameswariJ18, author = {Pratha Anuradha Kameswari and Lambadi Jyotsna}, title = {An Attack Bound for Small Multiplicative Inverse of \emph{{\(\varphi\)}}(\emph{N}) mod \emph{e} with a Composed Prime Sum \emph{p} + \emph{q} Using Sublattice Based Techniques}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {36}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040036}, doi = {10.3390/CRYPTOGRAPHY2040036}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KameswariJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KangFV18, author = {James Jin Kang and Kiran Fahd and Sitalakshmi Venkatraman}, title = {Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {38}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040038}, doi = {10.3390/CRYPTOGRAPHY2040038}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KangFV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KinsyBIM18, author = {Michel A. Kinsy and Lake Bu and Mihailo Isakov and Miguel Mark}, title = {Designing Secure Heterogeneous Multicore Systems from Untrusted Components}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {12}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030012}, doi = {10.3390/CRYPTOGRAPHY2030012}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KinsyBIM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Krovetz18, author = {Ted Krovetz}, title = {The Definition and Software Performance of Hashstream, a Fast Length-Flexible {PRF}}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {31}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040031}, doi = {10.3390/CRYPTOGRAPHY2040031}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Krovetz18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LauT18, author = {Terry Shue Chien Lau and Chik How Tan}, title = {A New Technique in Rank Metric Code-Based Encryption}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {32}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040032}, doi = {10.3390/CRYPTOGRAPHY2040032}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LauT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LitchfieldH18, author = {Alan T. Litchfield and Jeff Herbert}, title = {ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation}, journal = {Cryptogr.}, volume = {2}, number = {2}, pages = {10}, year = {2018}, url = {https://doi.org/10.3390/cryptography2020010}, doi = {10.3390/CRYPTOGRAPHY2020010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LitchfieldH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/NitaMP18, author = {Stefania Loredana Nita and Marius Iulian Mihailescu and Valentin Corneliu Pau}, title = {Security and Cryptographic Challenges for Authentication Based on Biometrics Data}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {39}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040039}, doi = {10.3390/CRYPTOGRAPHY2040039}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/NitaMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/OmetovBM0MK18, author = {Aleksandr Ometov and Sergey Bezzateev and Niko M{\"{a}}kitalo and Sergey Andreev and Tommi Mikkonen and Yevgeni Koucheryavy}, title = {Multi-Factor Authentication: {A} Survey}, journal = {Cryptogr.}, volume = {2}, number = {1}, pages = {1}, year = {2018}, url = {https://doi.org/10.3390/cryptography2010001}, doi = {10.3390/CRYPTOGRAPHY2010001}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/OmetovBM0MK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/OwenHCCSAP18, author = {Don Owen Jr. and Derek Heeger and Calvin Chan and Wenjie Che and Fareena Saqib and Matthew Areno and Jim Plusquellic}, title = {An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {15}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030015}, doi = {10.3390/CRYPTOGRAPHY2030015}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/OwenHCCSAP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Partala18, author = {Juha Partala}, title = {Provably Secure Covert Communication on Blockchain}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {18}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030018}, doi = {10.3390/CRYPTOGRAPHY2030018}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Partala18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Persichetti18, author = {Edoardo Persichetti}, title = {Efficient One-Time Signatures from Quasi-Cyclic Codes: {A} Full Treatment}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {30}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040030}, doi = {10.3390/CRYPTOGRAPHY2040030}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Persichetti18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PlusquellicA18, author = {Jim Plusquellic and Matthew Areno}, title = {Correlation-Based Robust Authentication (Cobra) Using Helper Data Only}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {21}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030021}, doi = {10.3390/CRYPTOGRAPHY2030021}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/PlusquellicA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SakibKTRR18, author = {Sadman Sakib and Preeti Kumari and Bashir M. Sabquat Bahar Talukder and Md. Tauhidur Rahman and Biswajit Ray}, title = {Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics \({}^{\mbox{{\textdagger}}}\)}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {17}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030017}, doi = {10.3390/CRYPTOGRAPHY2030017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SakibKTRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SalamSBDW18, author = {Md. Iftekhar Salam and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon{-}Ho Wong}, title = {Fault Attacks on the Authenticated Encryption Stream Cipher {MORUS}}, journal = {Cryptogr.}, volume = {2}, number = {1}, pages = {4}, year = {2018}, url = {https://doi.org/10.3390/cryptography2010004}, doi = {10.3390/CRYPTOGRAPHY2010004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SalamSBDW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SheikhC18, author = {Rami Sheikh and Rosario Cammarota}, title = {Improving Performance and Mitigating Fault Attacks Using Value Prediction}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {27}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040027}, doi = {10.3390/CRYPTOGRAPHY2040027}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SheikhC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/SuomalainenKKL18, author = {Jani Suomalainen and Adrian Kotelba and Jari Kreku and Sami Lehtonen}, title = {Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT}, journal = {Cryptogr.}, volume = {2}, number = {1}, pages = {5}, year = {2018}, url = {https://doi.org/10.3390/cryptography2010005}, doi = {10.3390/CRYPTOGRAPHY2010005}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/SuomalainenKKL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Trostle18, author = {Jonathan T. Trostle}, title = {{CMCC:} Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {42}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040042}, doi = {10.3390/CRYPTOGRAPHY2040042}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Trostle18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/VascoRS18, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Angela Robinson and Rainer Steinwandt}, title = {Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside \emph{S\({}_{\mbox{n}}\)}}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {16}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030016}, doi = {10.3390/CRYPTOGRAPHY2030016}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/VascoRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Vogt18, author = {Andreas Vogt}, title = {Special Issue on Cryptographic Protocols}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {19}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030019}, doi = {10.3390/CRYPTOGRAPHY2030019}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Vogt18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/WehbeMK18, author = {Taimour Wehbe and Vincent John Mooney III and David C. Keezer}, title = {Hardware-Based Run-Time Code Integrity in Embedded Devices}, journal = {Cryptogr.}, volume = {2}, number = {3}, pages = {20}, year = {2018}, url = {https://doi.org/10.3390/cryptography2030020}, doi = {10.3390/CRYPTOGRAPHY2030020}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/WehbeMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BricoutC17, author = {R{\'{e}}mi Bricout and Andr{\'{e}} Chailloux}, title = {Recursive Cheating Strategies for the Relativistic F\emph{\({}_{\mbox{Q}}\)} Bit Commitment Protocol}, journal = {Cryptogr.}, volume = {1}, number = {2}, pages = {14}, year = {2017}, url = {https://doi.org/10.3390/cryptography1020014}, doi = {10.3390/CRYPTOGRAPHY1020014}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BricoutC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CheKMSP17, author = {Wenjie Che and Venkata K. Kajuluri and Mitchell T. Martin and Fareena Saqib and Jim Plusquellic}, title = {Analysis of Entropy in a Hardware-Embedded Delay {PUF}}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {8}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010008}, doi = {10.3390/CRYPTOGRAPHY1010008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CheKMSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CheKSP17, author = {Wenjie Che and Venkata K. Kajuluri and Fareena Saqib and Jim Plusquellic}, title = {Leveraging Distributions in Physical Unclonable Functions}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {17}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030017}, doi = {10.3390/CRYPTOGRAPHY1030017}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CheKSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CheMPKSP17, author = {Wenjie Che and Mitchell T. Martin and Goutham Pocklassery and Venkata K. Kajuluri and Fareena Saqib and Jim Plusquellic}, title = {A Privacy-Preserving, Mutual PUF-Based Authentication Protocol}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {3}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010003}, doi = {10.3390/CRYPTOGRAPHY1010003}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CheMPKSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/CostaFO17, author = {Daniel G. Costa and Jos{\'{e}} Solenir Lima Figuer{\^{e}}do and Gledson Oliveira}, title = {Cryptography in Wireless Multimedia Sensor Networks: {A} Survey and Research Directions}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {4}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010004}, doi = {10.3390/CRYPTOGRAPHY1010004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/CostaFO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/EcclesH17, author = {Tom Eccles and Basel Halak}, title = {Performance Analysis of Secure and Private Billing Protocols for Smart Metering}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {20}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030020}, doi = {10.3390/CRYPTOGRAPHY1030020}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/EcclesH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/EkladiousSG17, author = {George S. Eskander Ekladious and Robert Sabourin and Eric Granger}, title = {Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {22}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030022}, doi = {10.3390/CRYPTOGRAPHY1030022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/EkladiousSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/GilboaGN17, author = {Shoni Gilboa and Shay Gueron and Mridul Nandi}, title = {Balanced Permutations Even-Mansour Ciphers}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {2}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010002}, doi = {10.3390/CRYPTOGRAPHY1010002}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/GilboaGN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Hatzivasilis17, author = {George Hatzivasilis}, title = {Password-Hashing Status}, journal = {Cryptogr.}, volume = {1}, number = {2}, pages = {10}, year = {2017}, url = {https://doi.org/10.3390/cryptography1020010}, doi = {10.3390/CRYPTOGRAPHY1020010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Hatzivasilis17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/IsikW17, author = {Leyla Isik and Arne Winterhof}, title = {Maximum-Order Complexity and Correlation Measures}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {7}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010007}, doi = {10.3390/CRYPTOGRAPHY1010007}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/IsikW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JeongAKL17, author = {Hae{-}Duck J. Jeong and WonHwi Ahn and Hyeonggeun Kim and Jong{-}Suk Ruth Lee}, title = {Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {24}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030024}, doi = {10.3390/CRYPTOGRAPHY1030024}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/JeongAKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/JinH0NFDD17, author = {Chenglu Jin and Charles Herder and Ling Ren and Phuong Ha Nguyen and Benjamin Fuller and Srinivas Devadas and Marten van Dijk}, title = {{FPGA} Implementation of a Cryptographically-Secure {PUF} Based on Learning Parity with Noise}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {23}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030023}, doi = {10.3390/CRYPTOGRAPHY1030023}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/JinH0NFDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KashefiP17, author = {Elham Kashefi and Anna Pappa}, title = {Multiparty Delegated Quantum Computing}, journal = {Cryptogr.}, volume = {1}, number = {2}, pages = {12}, year = {2017}, url = {https://doi.org/10.3390/cryptography1020012}, doi = {10.3390/CRYPTOGRAPHY1020012}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KashefiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KashefiW17, author = {Elham Kashefi and Petros Wallden}, title = {Garbled Quantum Computation}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {6}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010006}, doi = {10.3390/CRYPTOGRAPHY1010006}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KashefiW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Kim17, author = {Kwangjo Kim}, title = {\emph{Cryptography}: {A} New Open Access Journal}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {1}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010001}, doi = {10.3390/CRYPTOGRAPHY1010001}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Kim17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/KulshresthaRDS17, author = {Anunay Kulshrestha and Akshay Rampuria and Matthew Denton and Ashwin Sreenivas}, title = {Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {25}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030025}, doi = {10.3390/CRYPTOGRAPHY1030025}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/KulshresthaRDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/PljonkinRS17, author = {Anton Pljonkin and Konstantin E. Rumyantsev and Pradeep Kumar Singh}, title = {Synchronization in Quantum Key Distribution Systems}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {18}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030018}, doi = {10.3390/CRYPTOGRAPHY1030018}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/PljonkinRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RenwickM17, author = {Sarah Louise Renwick and Keith M. Martin}, title = {Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {19}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030019}, doi = {10.3390/CRYPTOGRAPHY1030019}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/RenwickM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RomanoS17, author = {Diego Romano and Giovanni Schmid}, title = {Beyond Bitcoin: {A} Critical Look at Blockchain-Based Systems}, journal = {Cryptogr.}, volume = {1}, number = {2}, pages = {15}, year = {2017}, url = {https://doi.org/10.3390/cryptography1020015}, doi = {10.3390/CRYPTOGRAPHY1020015}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/RomanoS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/RoyK17, author = {Swapnoneel Roy and Chanchal Khatwani}, title = {Cryptanalysis and Improvement of {ECC} Based Authentication and Key Exchanging Protocols}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {9}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010009}, doi = {10.3390/CRYPTOGRAPHY1010009}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/RoyK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Shaw17, author = {Harry C. Shaw}, title = {A Cryptographic System Based upon the Principles of Gene Expression}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {21}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030021}, doi = {10.3390/CRYPTOGRAPHY1030021}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Shaw17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Sikora17, author = {Jamie Sikora}, title = {Simple, Near-Optimal Quantum Protocols for Die-Rolling}, journal = {Cryptogr.}, volume = {1}, number = {2}, pages = {11}, year = {2017}, url = {https://doi.org/10.3390/cryptography1020011}, doi = {10.3390/CRYPTOGRAPHY1020011}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Sikora17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Sklavos17, author = {Nicolas Sklavos}, title = {Privacy in a Digital, Networked World: Technologies, Implications and Solutions. By Sherali Zeadally and Mohamad Badra. Springer International Publishing: 418 pp.; {\textdollar}51.89; {ISBN-10:} 3319084690, {ISBN-13:} 978-3319084695}, journal = {Cryptogr.}, volume = {1}, number = {1}, pages = {5}, year = {2017}, url = {https://doi.org/10.3390/cryptography1010005}, doi = {10.3390/CRYPTOGRAPHY1010005}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/Sklavos17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/Thullier0M17, author = {Florentin Thullier and Bruno Bouchard and Bob{-}Antoine Jerry M{\'{e}}n{\'{e}}las}, title = {A Text-Independent Speaker Authentication System for Mobile Devices}, journal = {Cryptogr.}, volume = {1}, number = {3}, pages = {16}, year = {2017}, url = {https://doi.org/10.3390/cryptography1030016}, doi = {10.3390/CRYPTOGRAPHY1030016}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/Thullier0M17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZouL0PS17, author = {Xukai Zou and Huian Li and Feng Li and Wei Peng and Yan Sui}, title = {Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election}, journal = {Cryptogr.}, volume = {1}, number = {2}, pages = {13}, year = {2017}, url = {https://doi.org/10.3390/cryptography1020013}, doi = {10.3390/CRYPTOGRAPHY1020013}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/ZouL0PS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.