Journal: Cryptography

Volume 8, Issue 3

27 -- 0Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, Isa Inuwa-Dutse, Saad Khan 0001, Simon Parkinson. The Emerging Challenges of Wearable Biometric Cryptosystems
28 -- 0Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Dzianis Kanonik, Kateryna Kuznetsova, Oleksandr Domin. Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
29 -- 0Javier de la Cruz, Edgar Martínez-Moro, Steven Muñoz-Ruiz, Ricardo Villanueva-Polanco. Public Key Protocols from Twisted-Skew Group Rings
30 -- 0Mario Alviano, Giada Gabriele. Improve Parallel Resistance of Hashcash Tree
31 -- 0Dana Sairangazhykyzy Amirkhanova, Maksim Iavich, Orken Mamyrbayev. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles
32 -- 0Jenilee Jao, Ian Wilcox, Jim Plusquellic, Biliana S. Paskaleva, Pavel B. Bochev. Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions
33 -- 0Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Kateryna Kuznetsova, Dzianis Kanonik, Oleksandr Domin. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities
34 -- 0Zichu Liu, Jia Hou, Jianfei Wang 0003, Chen Yang 0005. A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
35 -- 0George Teseleanu. A Note on the Quasigroup of Lai-Massey Structures
36 -- 0Jaya Dofe, Wafi Danesh, Vaishnavi More, Aaditya Chaudhari. Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs
37 -- 0Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu 0008, Yong Yu 0002. RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62
38 -- 0Anatoly Bessalov, Volodymyr Sokolov, Serhii Abramov. Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves
39 -- 0Komala Rangappa, Arun Kumar Banavara Ramaswamy, Mahadeshwara Prasad, Shreyas Arun Kumar. A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment
40 -- 0Riley Vaughn, Mike Borowczak. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
41 -- 0Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang 0001. Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack
42 -- 0Xingan Dai, Xinquan Zhou, Dehua Zhou, Jinhan Zhong, Chao Hong. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts
43 -- 0Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan. CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs