Journal: Cryptography

Volume 1, Issue 3

16 -- 0Florentin Thullier, Bruno Bouchard 0001, Bob-Antoine-Jerry Ménélas. A Text-Independent Speaker Authentication System for Mobile Devices
17 -- 0Wenjie Che, Venkata K. Kajuluri, Fareena Saqib, Jim Plusquellic. Leveraging Distributions in Physical Unclonable Functions
18 -- 0Anton Pljonkin, Konstantin Rumyantsev, Pradeep Kumar Singh. Synchronization in Quantum Key Distribution Systems
19 -- 0Sarah Louise Renwick, Keith M. Martin. Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment
20 -- 0Tom Eccles, Basel Halak. Performance Analysis of Secure and Private Billing Protocols for Smart Metering
21 -- 0Harry Shaw. A Cryptographic System Based upon the Principles of Gene Expression
22 -- 0George S. Eskander Ekladious, Robert Sabourin, Eric Granger. Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems
23 -- 0Chenglu Jin, Charles Herder, Ling Ren 0001, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk. FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
24 -- 0Hae-Duck J. Jeong, WonHwi Ahn, Hyeonggeun Kim, Jong-Suk Ruth Lee. Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim
25 -- 0Anunay Kulshrestha, Akshay Rampuria, Matthew Denton, Ashwin Sreenivas. Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption

Volume 1, Issue 2

10 -- 0George Hatzivasilis. Password-Hashing Status
11 -- 0Jamie Sikora. Simple, Near-Optimal Quantum Protocols for Die-Rolling
12 -- 0Elham Kashefi, Anna Pappa. Multiparty Delegated Quantum Computing
13 -- 0Xukai Zou, Huian Li, Feng Li 0001, Wei Peng, Yan Sui. Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
14 -- 0Rémi Bricout, André Chailloux. Q Bit Commitment Protocol
15 -- 0Diego Romano, Giovanni Schmid. Beyond Bitcoin: A Critical Look at Blockchain-Based Systems

Volume 1, Issue 1

1 -- 0Kwangjo Kim. Cryptography: A New Open Access Journal
2 -- 0Shoni Gilboa, Shay Gueron, Mridul Nandi. Balanced Permutations Even-Mansour Ciphers
3 -- 0Wenjie Che, Mitchell Martin, Goutham Pocklassery, Venkata K. Kajuluri, Fareena Saqib, Jim Plusquellic. A Privacy-Preserving, Mutual PUF-Based Authentication Protocol
4 -- 0Daniel G. Costa, Solenir Figuerêdo, Gledson Oliveira. Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions
5 -- 0Nicolas Sklavos. Privacy in a Digital, Networked World: Technologies, Implications and Solutions. By Sherali Zeadally and Mohamad Badra. Springer International Publishing: 418 pp.; $51.89; ISBN-10: 3319084690, ISBN-13: 978-3319084695
6 -- 0Elham Kashefi, Petros Wallden. Garbled Quantum Computation
7 -- 0Leyla Isik, Arne Winterhof. Maximum-Order Complexity and Correlation Measures
8 -- 0Wenjie Che, Venkata K. Kajuluri, Mitchell Martin, Fareena Saqib, Jim Plusquellic. Analysis of Entropy in a Hardware-Embedded Delay PUF
9 -- 0Swapnoneel Roy, Chanchal Khatwani. Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols