Journal: Cryptography

Volume 8, Issue 4

44 -- 0Mohammed Rahmani, Abderrahmane Nitaj, M'hammed Ziane. Partial Exposure Attacks on a New RSA Variant
45 -- 0Mijail Borges-Quintana, Miguel A. Borges-Trenard, Osmani Tito-Corrioso, Omar Rojas, Guillermo Sosa Gómez. Combined and General Methodologies of Key Space Partition for the Cryptanalysis of Block Ciphers
46 -- 0Cyrus Minwalla, Jim Plusquellic, Eirini-Eleni Tsiropoulou. Lightweight Mutually Authenticated Key Exchange with Physical Unclonable Functions
47 -- 0Saadia Aziz, Ijaz Ali Shoukat, Mohsin Iftikhar, Mohsin Murtaza, Abdulmajeed M. Alenezi, Cheng-Chi Lee, Imran Taj. Next-Generation Block Ciphers: Achieving Superior Memory Efficiency and Cryptographic Robustness for IoT Devices
48 -- 0Wen Gao 0010, Haoyuan Yao, Baodong Qin, Xiaoli Dong, Zhen Zhao 0005, Jiayu Zeng. Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions
49 -- 0Zeeshan Ashraf, Adnan Sohail, Muddesar Iqbal. Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
50 -- 0Shaoquan Jiang. Quantum Security of a Compact Multi-Signature
51 -- 0Laerte Peotta de Melo, Dino Macedo Amaral, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba. A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol
52 -- 0Ghassan Hameed Faraj, Kamal Shahtalebi, Hamid Mala. An Anonymous Authenticated Key Agreement Scheme for Telecare Medical Information Systems
53 -- 0Luigi Catuogno, Clemente Galdi. Implantable Medical Device Security
54 -- 0Evaristo José Madarro-Capó, Carlos Miguel Legón-Pérez, Guillermo Sosa Gómez, Omar Rojas. New Weak Keys with Parity Patterns in the RC4 Stream Cipher
55 -- 0Indrakanti Aishwarya, Lakshmy Koduvayur Viswanathan, Chungath Srinivasan, Girish Mishra, Saibal K. Pal, M. Sethumadhavan 0001. Improving the Security of the LCB Block Cipher Against Deep Learning-Based Attacks
56 -- 0Luis Adrián Lizama-Pérez. A Matrix Multiplication Approach to Quantum-Safe Cryptographic Systems
57 -- 0Chen Wang, Zi-Yuan Liu, Masahiro Mambo. On the Proof of Ownership of Digital Wallets
58 -- 0Shengnan Zhao, Chuan Zhao, Yuchen Huang, Xiangfu Song, Qiuliang Xu. Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives