Journal: Cryptography

Volume 2, Issue 4

27 -- 0Rami Sheikh, Rosario Cammarota. Improving Performance and Mitigating Fault Attacks Using Value Prediction
28 -- 0Ying-Yu Chen, Bo-Yuan Huang, Justie Su-tzu Juan. n)-Threshold Progressive Visual Secret Sharing without Expansion
29 -- 0Salome James, N. B. Gayathri, P. Vasudeva Reddy. Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
30 -- 0Edoardo Persichetti. Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
31 -- 0Ted Krovetz. The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF
32 -- 0Terry Shue Chien Lau, Chik-How Tan. A New Technique in Rank Metric Code-Based Encryption
33 -- 0Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu. Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption
34 -- 0Jialuo Han, Jidong Wang. An Enhanced Key Management Scheme for LoRaWAN
35 -- 0Xavier Boyen, Thomas Haines. Forward-Secure Linkable Ring Signatures from Bilinear Maps
36 -- 0Pratha Anuradha Kameswari, Lambadi Jyotsna. q Using Sublattice Based Techniques
37 -- 0Megha Agrawal, Donghoon Chang, Jinkeon Kang. Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
38 -- 0James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman. Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
39 -- 0Stefania Loredana Nita, Marius Iulian Mihailescu, Valentin Corneliu Pau. Security and Cryptographic Challenges for Authentication Based on Biometrics Data
40 -- 0Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo. Redundancy in Key Management for WSNs
41 -- 0Christian Frøystad, Inger Anne Tøndel, Martin Gilje Jaatun. Security Incident Information Exchange for Cloud Service Provisioning Chains
42 -- 0Jonathan T. Trostle. CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion