Journal: Cryptography

Volume 5, Issue 4

26 -- 0Julian Danner, Martin Kreuzer. A Fault Attack on the Family of Enocoro Stream Ciphers
27 -- 0Mohammad Anagreh, Peeter Laud, Eero Vainikko. Parallel Privacy-Preserving Shortest Path Algorithms
28 -- 0Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin 0001, Paulo Cesar G. da Costa, Setareh Rafatirad, Houman Homayoun. Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
29 -- 0Irene Ioannidou, Nicolas Sklavos 0001. On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
30 -- 0Bang Yuan Chong, Iftekhar Salam. Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
31 -- 0Alessandro Budroni, Qian Guo 0001, Thomas Johansson 0001, Erik Mårtensson, Paul Stankovski Wagner. Improvements on Making BKW Practical for Solving LWE
32 -- 0Emad Hamadaqa, Saleh Mulhem, Wael Adi, Mladen Berekovic. Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies
33 -- 0Johann-Philipp Thiers, Jürgen Freudenberger. Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography
34 -- 0Konstantinos Limniotis. Cryptography as the Means to Protect Fundamental Human Rights
35 -- 0K. S. Suvidha, Jothi Rangasamy, Shyam S. Kamath, Cheng-Chi Lee. ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks
36 -- 0Diego Romano, Giovanni Schmid. Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology
37 -- 0Noha Ezzat El-Attar, Doaa S. El-Morshedy, Wael A. Awad. A New Hybrid Automated Security Framework to Cloud Storage System
38 -- 0Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan. Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions