| 1 | -- | 0 | Jongkil Kim, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Intae Kim. Functional Encryption for Pattern Matching with a Hidden String |
| 2 | -- | 0 | Alfonso B. Labao, Henry N. Adorna. A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage |
| 3 | -- | 0 | Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai. A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity |
| 4 | -- | 0 | Byoung S. Ham 0001. Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness |
| 5 | -- | 0 | Shay Gueron, Edoardo Persichetti, Paolo Santini. Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup |
| 6 | -- | 0 | Jean Belo Klamti, M. Anwar Hasan. Post-Quantum Two-Party Adaptor Signature Based on Coding Theory |
| 7 | -- | 0 | . Acknowledgment to Reviewers of Cryptography in 2021 |
| 8 | -- | 0 | Marius Iulian Mihailescu, Stefania Loredana Nita. A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments |
| 9 | -- | 0 | Wenhua Gao, Li Yang, Daode Zhang, Xia Liu. Quantum Identity-Based Encryption from the Learning with Errors Problem |
| 10 | -- | 0 | Grzegorz Bazydlo, Remigiusz Wisniewski, Kamil Kozdrój. Trusted and Secure Blockchain-Based Durable Medium Electronic Service |
| 11 | -- | 0 | Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe. Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on the Internet of Things Devices |
| 12 | -- | 0 | Abdulbast A. Abushgra. Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review |
| 13 | -- | 0 | Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum. On the IND-CCA1 Security of FHE Schemes |