Journal: Cryptography

Volume 8, Issue 1

1 -- 0Ravikumar Selvam, Akhilesh Tyagi. Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks
2 -- 0Devanshi Upadhyaya, Maël Gay, Ilia Polian. Locking-Enabled Security Analysis of Cryptographic Circuits
3 -- 0Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang. Novel and Efficient Privacy-Preserving Continuous Authentication
4 -- 0Ahmad Kabil, Heba Aslan, Marianne Azer. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks
5 -- 0Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao 0005, Zung Le. Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
6 -- 0Chang Chen, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, Jin Li. Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols
7 -- 0Kyriaki Tsantikidou, Nicolas Sklavos 0001. Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
8 -- 0Sagarika Behera, Prathuri Jhansi Rani. FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data
9 -- 0Hakan Uzuner, Elif Bilge Kavun. NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V
10 -- 0Francesc Sebé, Sergi Simón. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval
11 -- 0Yan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu. Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography