1 | -- | 0 | Ravikumar Selvam, Akhilesh Tyagi. Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks |
2 | -- | 0 | Devanshi Upadhyaya, Maël Gay, Ilia Polian. Locking-Enabled Security Analysis of Cryptographic Circuits |
3 | -- | 0 | Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang. Novel and Efficient Privacy-Preserving Continuous Authentication |
4 | -- | 0 | Ahmad Kabil, Heba Aslan, Marianne Azer. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks |
5 | -- | 0 | Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao 0005, Zung Le. Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures |
6 | -- | 0 | Chang Chen, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, Jin Li. Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols |
7 | -- | 0 | Kyriaki Tsantikidou, Nicolas Sklavos 0001. Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures |
8 | -- | 0 | Sagarika Behera, Prathuri Jhansi Rani. FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data |
9 | -- | 0 | Hakan Uzuner, Elif Bilge Kavun. NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V |
10 | -- | 0 | Francesc Sebé, Sergi Simón. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval |
11 | -- | 0 | Yan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu. Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography |