| 31 | -- | 0 | Anca Radulescu, Marios O. Choudary. Side-Channel Attacks on Masked Bitsliced Implementations of AES |
| 32 | -- | 0 | Riccardo Longo, Carla Mascia, Alessio Meneghetti, Giordano Santilli, Giovanni Tognolini. Adaptable Cryptographic Primitives in Blockchains via Smart Contracts |
| 33 | -- | 0 | Abigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou 0002. A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things |
| 34 | -- | 0 | Febrianti Wibawa, Ferhat Özgür Çatak, Salih Sarp, Murat Kuzlu. BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models |
| 35 | -- | 0 | Yao Zeng, Yuxi Tang, Luping Xiang. Physical Layer Security Design for Polar Code Construction |
| 36 | -- | 0 | Brit Riggs, Michael Partridge, Bertrand Cambou, Ian Burke, Manuel Aguilar Rios, Julie Heynssens, Dina Ghanaimiandoab. Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function |
| 37 | -- | 0 | Vipin Kumar 0004, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad 0001, Abdul Razaque. Light Weight Authentication Scheme for Smart Home IoT Devices |
| 38 | -- | 0 | Donald E. Owen, Jithin Joseph, Jim Plusquellic, Tom J. Mannos, Brian Dziki. Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor |
| 39 | -- | 0 | Aritra Banerjee, Hitesh Tewari. Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant |
| 40 | -- | 0 | Zulianie Binti Jemihin, Soo-Fun Tan, Gwo Chin Chung. Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey |
| 41 | -- | 0 | Görkem Nisanci, Paul G. Flikkema, Tolga Yalçin. Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms |
| 42 | -- | 0 | Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou. How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem |
| 43 | -- | 0 | Rajesh Datta, Guangwei Zhao, Kanad Basu, Kaveh Shamsi. A Security Analysis of Circuit Clock Obfuscation |
| 44 | -- | 0 | Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, Herman Fesenko, Oleg Illiashenko. Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems |
| 45 | -- | 0 | Kyriaki Tsantikidou, Nicolas Sklavos 0001. Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare |
| 46 | -- | 0 | Katarzyna Koptyra, Marek R. Ogiela. Subliminal Channels in Visual Cryptography |
| 47 | -- | 0 | Faiza Hashim, Khaled Shuaib, Farag Sallabi. Connected Blockchain Federations for Sharing Electronic Health Records |