Journal: Cryptography

Volume 2, Issue 3

12 -- 0Michel A. Kinsy, Lake Bu, Mihailo Isakov, Miguel Mark. Designing Secure Heterogeneous Multicore Systems from Untrusted Components
13 -- 0Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser 0001.
14 -- 0Balaji Chandrasekaran, Ramadoss Balakrishnan. An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments
15 -- 0Don Owen Jr., Derek Heeger, Calvin Chan, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic. An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays
16 -- 0Maria Isabel Gonzalez Vasco, Angela Robinson, Rainer Steinwandt. n
17 -- 0Sadman Sakib, Preeti Kumari, B. M. S. Bahar Talukder, Md. Tauhidur Rahman, Biswajit Ray.
18 -- 0Juha Partala. Provably Secure Covert Communication on Blockchain
19 -- 0Andreas Vogt 0001. Special Issue on Cryptographic Protocols
20 -- 0Taimour Wehbe, Vincent John Mooney III, David C. Keezer. Hardware-Based Run-Time Code Integrity in Embedded Devices
21 -- 0Jim Plusquellic, Matthew Areno. Correlation-Based Robust Authentication (Cobra) Using Helper Data Only
22 -- 0Yunxi Guo, Timothy Dee, Akhilesh Tyagi. Barrel Shifter Physical Unclonable Function Based Encryption
23 -- 0Sadiel de la Fe, Carles Ferrer 0001. k
24 -- 0Joy Jo-Yi Chang, Bo-Yuan Huang, Justie Su-tzu Juan. A New Visual Multi-Secrets Sharing Scheme by Random Grids
25 -- 0Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub 0001. N)
26 -- 0William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj. Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers