| 12 | -- | 0 | Michel A. Kinsy, Lake Bu, Mihailo Isakov, Miguel Mark. Designing Secure Heterogeneous Multicore Systems from Untrusted Components |
| 13 | -- | 0 | Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser 0001. † |
| 14 | -- | 0 | Balaji Chandrasekaran, Ramadoss Balakrishnan. An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments |
| 15 | -- | 0 | Don Owen Jr., Derek Heeger, Calvin Chan, Wenjie Che, Fareena Saqib, Matthew Areno, Jim Plusquellic. An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays |
| 16 | -- | 0 | Maria Isabel Gonzalez Vasco, Angela Robinson, Rainer Steinwandt. n |
| 17 | -- | 0 | Sadman Sakib, Preeti Kumari, B. M. S. Bahar Talukder, Md. Tauhidur Rahman, Biswajit Ray. † |
| 18 | -- | 0 | Juha Partala. Provably Secure Covert Communication on Blockchain |
| 19 | -- | 0 | Andreas Vogt 0001. Special Issue on Cryptographic Protocols |
| 20 | -- | 0 | Taimour Wehbe, Vincent John Mooney III, David C. Keezer. Hardware-Based Run-Time Code Integrity in Embedded Devices |
| 21 | -- | 0 | Jim Plusquellic, Matthew Areno. Correlation-Based Robust Authentication (Cobra) Using Helper Data Only |
| 22 | -- | 0 | Yunxi Guo, Timothy Dee, Akhilesh Tyagi. Barrel Shifter Physical Unclonable Function Based Encryption |
| 23 | -- | 0 | Sadiel de la Fe, Carles Ferrer 0001. k |
| 24 | -- | 0 | Joy Jo-Yi Chang, Bo-Yuan Huang, Justie Su-tzu Juan. A New Visual Multi-Secrets Sharing Scheme by Random Grids |
| 25 | -- | 0 | Jean-Luc Danger, Youssef El Housni, Adrien Facon, Cheikh T. Gueye, Sylvain Guilley, Sylvie Herbel, Ousmane Ndiaye, Edoardo Persichetti, Alexander Schaub 0001. N) |
| 26 | -- | 0 | William Diehl, Abubakr Abdulgadir, Farnoud Farahmand, Jens-Peter Kaps, Kris Gaj. Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers |