Journal: Cryptography

Volume 6, Issue 2

14 -- 0Timothy Dee, Ian Richardson, Akhilesh Tyagi. Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication
15 -- 0Brian Goncalves, Atefeh Mashatan. Tightly Secure PKE Combiner in the Quantum Random Oracle Model
16 -- 0Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang, Tao Yuan. Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
17 -- 0Antonios Patergianakis, Konstantinos Limniotis. Privacy Issues in Stylometric Methods
18 -- 0Keerthi Nelaturu, Han Du, Duc-Phong Le. A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
19 -- 0Ezinam Bertrand Talaki, Olivier Savry, Mathieu Bouvier Des Noes, David Hély. A Memory Hierarchy Protected against Side-Channel Attacks
20 -- 0Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai. Certificate Management Scheme for VANETs Using Blockchain Structure
21 -- 0Sara D. Cardell, Verónica Requena, Amparo Fúster-Sabater. Computational Analysis of Interleaving PN-Sequences with Different Polynomials
22 -- 0Abhrajit Sengupta, Mohammed Nabeel 0001, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu. A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
23 -- 0Linir Zamir, Mehrdad Nojoumian. Localized State-Change Consensus in Immense and Highly Dynamic Environments
24 -- 0Mohammad Almseidin, Mouhammd Alkasassbeh 0001, Maen Alzubi, Jamil Al-Sawwa. Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation
25 -- 0Binh Kieu-Do-Nguyen, Cuong Pham-Quoc, Ngoc Thinh Tran, Cong-Kha Pham, Trong-Thuc Hoang. Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA
26 -- 0Alessandro Barenghi, Gioele Falcetti, Gerardo Pelosi. Locating Side Channel Leakage in Time through Matched Filters
27 -- 0Bartosz Drzazga, Lukasz Krzywiecki. Review of Chosen Isogeny-Based Cryptographic Schemes
28 -- 0Dina Ibrahim, Kareem Ahmed, Mohamed Abdallah, Abdelmgeid A. Ali. A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix
29 -- 0Damiano Azzolini, Fabrizio Riguzzi. Probabilistic Logic Models for the Lightning Network
30 -- 0Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, Trong-Thuc Hoang. ChaCha20-Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3