Journal: Cryptography

Volume 2, Issue 4

27 -- 0Rami Sheikh, Rosario Cammarota. Improving Performance and Mitigating Fault Attacks Using Value Prediction
28 -- 0Ying-Yu Chen, Bo-Yuan Huang, Justie Su-tzu Juan. n)-Threshold Progressive Visual Secret Sharing without Expansion
29 -- 0Salome James, N. B. Gayathri, P. Vasudeva Reddy. Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
30 -- 0Edoardo Persichetti. Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
31 -- 0Ted Krovetz. The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF
32 -- 0Terry Shue Chien Lau, Chik-How Tan. A New Technique in Rank Metric Code-Based Encryption
33 -- 0Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu. Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption
34 -- 0Jialuo Han, Jidong Wang. An Enhanced Key Management Scheme for LoRaWAN
35 -- 0Xavier Boyen, Thomas Haines. Forward-Secure Linkable Ring Signatures from Bilinear Maps
36 -- 0Pratha Anuradha Kameswari, Lambadi Jyotsna. q Using Sublattice Based Techniques
37 -- 0Megha Agrawal, Donghoon Chang, Jinkeon Kang. Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
38 -- 0James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman. Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
39 -- 0Stefania Loredana Nita, Marius Iulian Mihailescu, Valentin Corneliu Pau. Security and Cryptographic Challenges for Authentication Based on Biometrics Data
40 -- 0Filippo Gandino, Bartolomeo Montrucchio, Maurizio Rebaudengo. Redundancy in Key Management for WSNs
41 -- 0Christian Frøystad, Inger Anne Tøndel, Martin Gilje Jaatun. Security Incident Information Exchange for Cloud Service Provisioning Chains
42 -- 0Jonathan T. Trostle. CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

Volume 2, Issue 3

12 -- 0Michel A. Kinsy, Lake Bu, Mihailo Isakov, Miguel Mark. Designing Secure Heterogeneous Multicore Systems from Untrusted Components
13 -- 0Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser 0001.
14 -- 0Balaji Chandrasekaran, Ramadoss Balakrishnan. An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments
15 -- 0Don Owen Jr., Derek Heeger, Calvin Chan, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic. An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays
16 -- 0Maria Isabel Gonzalez Vasco, Angela Robinson, Rainer Steinwandt. n
17 -- 0Sadman Sakib, Preeti Kumari, B. M. S. Bahar Talukder, Md. Tauhidur Rahman, Biswajit Ray.
18 -- 0Juha Partala. Provably Secure Covert Communication on Blockchain
19 -- 0Andreas Vogt 0001. Special Issue on Cryptographic Protocols
20 -- 0Taimour Wehbe, Vincent John Mooney III, David C. Keezer. Hardware-Based Run-Time Code Integrity in Embedded Devices
21 -- 0Jim Plusquellic, Matthew Areno. Correlation-Based Robust Authentication (Cobra) Using Helper Data Only
22 -- 0Yunxi Guo, Timothy Dee, Akhilesh Tyagi. Barrel Shifter Physical Unclonable Function Based Encryption
23 -- 0Sadiel de la Fe, Carles Ferrer 0001. k
24 -- 0Joy Jo-Yi Chang, Bo-Yuan Huang, Justie Su-tzu Juan. A New Visual Multi-Secrets Sharing Scheme by Random Grids
25 -- 0Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub 0001. N)
26 -- 0William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj. Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers

Volume 2, Issue 2

7 -- 0Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser 0001, John A. Chandy, Fatemeh Tehranipoor. An Overview of DRAM-Based Security Primitives
8 -- 0Sebastian Baur, Holger Boche. Robust Secure Authentication and Data Storage with Perfect Secrecy
9 -- 0Filipe Casal, João Rasga, André Souto. Kolmogorov One-Way Functions Revisited
10 -- 0Alan T. Litchfield, Jeff Herbert. ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation
11 -- 0Shoichi Hirose. Sequential Hashing with Minimum Padding

Volume 2, Issue 1

1 -- 0Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev 0001, Tommi Mikkonen, Yevgeni Koucheryavy. Multi-Factor Authentication: A Survey
3 -- 0Dimitrios Alvanos, Konstantinos Limniotis, Stavros Stavrou. On the Cryptographic Features of a VoIP Service
4 -- 0Md. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong. Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
5 -- 0Jani Suomalainen, Adrian Kotelba, Jari Kreku, Sami Lehtonen. Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
6 -- 0Bertrand Cambou, Paul G. Flikkema, James Palmer, Donald Telesca, Christopher Philabaum. Can Ternary Computing Improve Information Assurance?