


default search action
Cryptography, Volume 4
Volume 4, Number 1, March 2020
- Emad Hamadaqa, Ayoub Mars

, Wael Adi:
Physical Security for Fleet Management Systems. 1 - Alexander Sauer

, Gernot Alber
:
Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming. 2 - Damian Markham, Alexandra Krause:

A Simple Protocol for Certifying Graph States and Applications in Quantum Networks. 3 - Acknowledgement to Reviewers of Cryptography in 2019. 4

- Eric Järpe

:
An Alternative Diffie-Hellman Protocol. 5 - Saleh Mulhem

, Ayoub Mars
, Wael Adi:
Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities. 6 - Luca Mazzarella

, Christopher John Lowe
, David Lowndes
, Siddarth Koduru Joshi
, Steve Greenland, Doug McNeil, Cassandra Mercury, Malcolm Macdonald
, John G. Rarity, Daniel Kuan Li Oi
:
QUARC: Quantum Research Cubesat - A Constellation for Quantum Communication. 7 - Md Jubayer al Mahmod, Ujjwal Guin:

A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications. 8 - Reham Almukhlifi

, Poorvi L. Vora:
Linear Cryptanalysis of Reduced-Round Simon Using Super Rounds. 9 - Gorjan Alagic

, Stacey Jeffery
, Maris Ozols
, Alexander Poremba:
On Quantum Chosen-Ciphertext Attacks and Learning with Errors. 10
Volume 4, Number 2, June 2020
- Mitchell T. Martin, Jim Plusquellic

:
NotchPUF: Printed Circuit Board PUF Based on Microstrip Notch Filter. 11 - Robert Cockell, Basel Halak

:
On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics. 12 - Ivan Bow, Nahome Bete, Fareena Saqib, Wenjie Che

, Chintan Patel, Ryan W. Robucci, Calvin Chan, Jim Plusquellic
:
Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity. 13 - Aysajan Abidin

:
On Detecting Relay Attacks on RFID Systems Using Qubits. 14 - Mark Randolph, William Diehl:

Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman. 15 - Maki Kihara

, Satoshi Iriyama:
Security and Performance of Single Sign-on Based on One-Time Pad Algorithm. 16 - Bertrand Cambou, Michael Gowanlock

, Julie Heynssens, Saloni Jain
, Christopher Robert Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca, Laurent Njilla:
Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions. 17 - Mohammed Abu Taha

, Wassim Hamidouche
, Naty Sidaty, Marko Viitanen
, Jarno Vanne
, Safwan El Assad, Olivier Déforges:
Privacy Protection in Real Time HEVC Standard Using Chaotic System. 18
Volume 4, Number 3, September 2020
- Mayssa Tayachi, Saleh Mulhem

, Wael Adi, Laurent Nana, Anca Pascu, Faouzi Benzarti
:
Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems. 19 - Donghoe Heo

, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
:
Optimized CSIDH Implementation Using a 2-Torsion Point. 20 - Koki Jimbo

, Satoshi Iriyama, Massimo Regoli
:
Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization. 21 - Ashutosh Dhar Dwivedi

:
Security Analysis of Lightweight IoT Cipher: Chaskey. 22 - Takeshi Sugawara

:
Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation. 23 - Noah Cowper, Harry C. Shaw

, David R. Thayer
:
Chaotic Quantum Key Distribution. 24 - Georgia Tsaloli

, Gustavo Banegas
, Aikaterini Mitrokotsa
:
Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing. 25
Volume 4, Number 4, December 2020
- Ali Shuja Siddiqui

, Yutian Gui, Fareena Saqib:
Secure Boot for Reconfigurable Architectures. 26 - Sylvain Guilley

, Khaled Karray
, Thomas Perianin, Ritu Ranjan Shrivastwa
, Youssef Souissi, Sofiane Takarabt:
Side-Channel Evaluation Methodology on Software. 27 - Yunhong Zhou

, Shihui Zheng, Licheng Wang
:
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud. 28 - Bharath K. Samanthula, Divya Karthikeyan, Boxiang Dong, K. Anitha Kumari

:
ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services. 29 - Debayan Das

, Shreyas Sen:
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach. 30 - Georgios M. Nikolopoulos

, Marc Fischlin
:
Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources. 31 - Jeff Nijsse

, Alan T. Litchfield
:
A Taxonomy of Blockchain Consensus Methods. 32 - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba

:
Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation. 33 - Sergey Bezzateev

, Vadim Davydov
, Aleksandr Ometov
:
On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication. 34 - Oleg Evsutin

, Kristina Dzhanashia
:
Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security. 35 - Rinat Breuer, Itamar Levi

:
How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security Evaluation and its Cost. 36 - Bei Liang

, Gustavo Banegas
, Aikaterini Mitrokotsa
:
Statically Aggregate Verifiable Random Functions and Application to E-Lottery. 37

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














