Journal: Cryptography

Volume 8, Issue 2

12 -- 0Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng, Chase Q. Wu. A Survey of Consortium Blockchain and Its Applications
13 -- 0Minyan Gao, Liton Kumar Biswas, Navid Asadi, Domenic Forte. Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource
14 -- 0Maksymilian Gorski, Wojciech Wodo. Analysis of Biometric-Based Cryptographic Key Exchange Protocols - BAKE and BRAKE
15 -- 0Maksim Iavich, Tamari Kuchukhidze. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
16 -- 0Idris Somoye, Jim Plusquellic, Tom J. Mannos, Brian Dziki. An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor
17 -- 0Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography
18 -- 0Peng Zhang 0029, Ao Duan, Hengrui Lu. An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks
19 -- 0Ádám Vécsi, Attila Pethö. Auditable Anonymous Electronic Examination
20 -- 0Zahraa Abdullah Ali, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish. A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids
21 -- 0Gregory Fitzgibbon, Carlo Ottaviani. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
22 -- 0Gregor Haywood, Saleem N. Bhatti. Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths
23 -- 0Lahraoui Younes, Saiida Lazaar, Amal Youssef, Abderrahmane Nitaj. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance
24 -- 0Abdullah Aljuffri, Ruoyu Huang, Laura Muntenaar, Georgi Gaydadjiev, Kezheng Ma, Said Hamdioui, Mottaqiallah Taouil. The Security Evaluation of an Efficient Lightweight AES Accelerator
25 -- 0Chunlei Li 0001. A Survey on Complexity Measures for Pseudo-Random Sequences
26 -- 0Asma Sifaoui, Matthew S. Eastin. "Whispers from the Wrist": Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities