12 | -- | 0 | Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng, Chase Q. Wu. A Survey of Consortium Blockchain and Its Applications |
13 | -- | 0 | Minyan Gao, Liton Kumar Biswas, Navid Asadi, Domenic Forte. Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource |
14 | -- | 0 | Maksymilian Gorski, Wojciech Wodo. Analysis of Biometric-Based Cryptographic Key Exchange Protocols - BAKE and BRAKE |
15 | -- | 0 | Maksim Iavich, Tamari Kuchukhidze. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation |
16 | -- | 0 | Idris Somoye, Jim Plusquellic, Tom J. Mannos, Brian Dziki. An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor |
17 | -- | 0 | Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography |
18 | -- | 0 | Peng Zhang 0029, Ao Duan, Hengrui Lu. An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks |
19 | -- | 0 | Ádám Vécsi, Attila Pethö. Auditable Anonymous Electronic Examination |
20 | -- | 0 | Zahraa Abdullah Ali, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish. A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids |
21 | -- | 0 | Gregory Fitzgibbon, Carlo Ottaviani. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography |
22 | -- | 0 | Gregor Haywood, Saleem N. Bhatti. Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths |
23 | -- | 0 | Lahraoui Younes, Saiida Lazaar, Amal Youssef, Abderrahmane Nitaj. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance |
24 | -- | 0 | Abdullah Aljuffri, Ruoyu Huang, Laura Muntenaar, Georgi Gaydadjiev, Kezheng Ma, Said Hamdioui, Mottaqiallah Taouil. The Security Evaluation of an Efficient Lightweight AES Accelerator |
25 | -- | 0 | Chunlei Li 0001. A Survey on Complexity Measures for Pseudo-Random Sequences |
26 | -- | 0 | Asma Sifaoui, Matthew S. Eastin. "Whispers from the Wrist": Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities |