Journal: Cryptography

Volume 3, Issue 4

25 -- 0Lukas Fladung, Georgios M. Nikolopoulos, Gernot Alber, Marc Fischlin. Intercept-Resend Emulation Attacks against a Continuous-Variable Quantum Authentication Protocol with Physical Unclonable Keys
26 -- 0Niraj Kumar. Practically Feasible Robust Quantum Money with Classical Verification
27 -- 0Brian Coyle, Elham Kashefi, Matty J. Hoban. Certified Randomness From Steering Using Sequential Measurements
28 -- 0Saleh Mulhem, Wael Adi. New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices

Volume 3, Issue 3

17 -- 0Md Shahed Enamul Quadir, John A. Chandy. Key Generation for Hardware Obfuscation Using Strong PUFs
18 -- 0Jeff Calhoun, Cyrus Minwalla, Charles Helmich, Fareena Saqib, Wenjie Che, Jim Plusquellic. Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)
19 -- 0Maki Kihara, Satoshi Iriyama. New Authentication Algorithm Based on Verifiable Encryption with Digital Identity
20 -- 0Sitalakshmi Venkatraman, Anthony Overmars. New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT
21 -- 0Amit Phadikar, Poulami Jana, Himadri S. Mandal. Reversible Data Hiding for DICOM Image Using Lifting and Companding
22 -- 0Kai-Min Chung, Marios Georgiou 0001, Ching-Yi Lai, Vassilis Zikas. Cryptography with Disposable Backdoors
23 -- 0Matthew Campagna, Shay Gueron. Key Management Systems at the Cloud Scale
24 -- 0Alzahraa J. Mohammed, Ali A. Yassin. Efficient and Flexible Multi-Factor Authentication Protocol Based on Fuzzy Extractor of Administrator's Fingerprint and Smart Mobile Device

Volume 3, Issue 2

11 -- 0Ayoub Mars, Wael Adi. New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures
12 -- 0Bhupendra Nath Tiwari, Jude Kibinde Kuipo, Joshua Muyiwa Adeegbe, Ninoslav Marina. Optimized AKS Primality Testing: A Fluctuation Theory Perspective
13 -- 0Tariq Shah, Ayesha Qureshi. S-Box on Subgroup of Galois Field
14 -- 0Mohamad Ali Mehrabi. Improved Sum of Residues Modular Multiplication Algorithm
15 -- 0Sally Lin Pei Ching, Faridah Yunos. Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction
16 -- 0Ibou Sene, Abdoul Aziz Ciss, Oumar Niang. I2PA: An Efficient ABC for IoT

Volume 3, Issue 1

1 -- 0Seyed Mojtaba Dehnavi. Further Observations on SIMON and SPECK Block Cipher Families
2 -- 0Muhammad Rezal Kamel Ariffin, Saidu Isah Abubakar, Faridah Yunos, Muhammad Asyraf Asbullah. pq Using Small Prime Difference Method
3 -- 0Asad Ali Siyal, Aisha Zahid Junejo, Muhammad Zawish, Kainat Ahmed, Aiman Khalil, Georgia Soursou. Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives
4 -- 0Ashutosh Dhar Dwivedi, Shalini Dhar, Gautam Srivastava, Rajani Singh. Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
5 -- 0Cryptography Editorial Office. Cryptography in 2018
6 -- 0Yasir Naseer, Tariq Shah, Dawood Shah, Sadam Hussain. A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes
7 -- 0Karuna Pande Joshi, Agniva Banerjee. Automating Privacy Compliance Using Policy Integrated Blockchain
8 -- 0Le Van Luyen. An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow
9 -- 0Luigi Accardi, Satoshi Iriyama, Koki Jimbo, Massimo Regoli. A New Class of Strongly Asymmetric PKA Algorithms: SAA-5
10 -- 0Syed Kamran Haider, Marten van Dijk. Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors