1311 | -- | 0 | Tomer Ashur, Chris J. Mitchell. Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword |
1312 | -- | 1319 | Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar. How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk |
1320 | -- | 1334 | Nina Bindel, Sarah McCarthy. The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices |
1335 | -- | 1341 | Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom. Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung |
1342 | -- | 1349 | Daniel Shumow. Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts |
1350 | -- | 1365 | Satish Muppidi, Om Prakash P. G, B. Kishore. Dragonfly Political Optimizer Algorithm-Based Rider Deep Long Short-Term Memory for Soil Moisture and Heat Level Prediction in IoT |
1366 | -- | 1375 | Hieu Minh Truong, Hieu Trung Huynh. A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning |
1376 | -- | 1399 | Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma. On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80 |
1400 | -- | 1418 | Shusen Wu, Xiaoshe Dong, Heng Chen 0002, Longxiang Wang, Qiang Wang, Zhengdong Zhu. Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description |
1419 | -- | 1433 | Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan. A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs |
1434 | -- | 1451 | Hailong Zhang 0001, Wei Yang. Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations |
1452 | -- | 1476 | Hisaki Kobayashi, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa. A Self-Stabilizing Distributed Algorithm for the Generalized Dominating Set Problem With Safe Convergence |
1477 | -- | 1506 | Damian Arellanes, Kung-Kiu Lau, Rizos Sakellariou. Decentralized Data Flows for the Functional Scalability of Service-Oriented IoT Systems |
1507 | -- | 1524 | Ti Wang, Yongbin Zhou, Hui Ma 0002, Rui Zhang. Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud |
1525 | -- | 1540 | Sinam Ajitkumar Singh, Ningthoujam Dinita Devi, Swanirbhar Majumder. An Improved Unsegmented Phonocardiogram Classification Using Nonlinear Time Scattering Features |
1541 | -- | 1548 | Ahmet Gökçen, Alkim Gokcen, Savas Sahin. Prediction of Li-Ion Battery Discharge Patterns in IoT Devices Under Random Use Via Machine Learning Algorithms |
1549 | -- | 1562 | Pravin Narayan Kathavate. Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment |
1563 | -- | 0 | . Corrigendum to: IoT Data Quality Issues and Potential Solutions: A Literature Review |
1564 | -- | 0 | . Corrigendum to: A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification |