Journal: Cryptography

Volume 4, Issue 4

26 -- 0Ali Shuja Siddiqui, Yutian Gui, Fareena Saqib. Secure Boot for Reconfigurable Architectures
27 -- 0Sylvain Guilley, Khaled Karray, Thomas Perianin, Ritu Ranjan Shrivastwa, Youssef Souissi, Sofiane Takarabt. Side-Channel Evaluation Methodology on Software
28 -- 0Yunhong Zhou, Shihui Zheng, Licheng Wang. Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud
29 -- 0Bharath K. Samanthula, Divya Karthikeyan, Boxiang Dong, K. Anitha Kumari. ESPADE: An Efficient and Semantically Secure Shortest Path Discovery for Outsourced Location-Based Services
30 -- 0Debayan Das, Shreyas Sen. Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures through White-Box Approach
31 -- 0Georgios M. Nikolopoulos, Marc Fischlin. Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
32 -- 0Jeff Nijsse, Alan T. Litchfield. A Taxonomy of Blockchain Consensus Methods
33 -- 0Maharage Nisansala Sevwandi Perera, Takeshi Koshiba. Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation
34 -- 0Sergey Bezzateev, Vadim Davydov, Aleksandr Ometov. On Secret Sharing with Newton's Polynomial for Multi-Factor Authentication
35 -- 0Oleg Evsutin, Kristina Dzhanashia. Algorithm of Information Embedding into Digital Images Based on the Chinese Remainder Theorem for Data Security
36 -- 0Rinat Breuer, Itamar Levi. How Bad Are Bad Templates? Optimistic Design-Stage Side-Channel Security Evaluation and its Cost
37 -- 0Bei Liang, Gustavo Banegas, Aikaterini Mitrokotsa. Statically Aggregate Verifiable Random Functions and Application to E-Lottery

Volume 4, Issue 3

19 -- 0Mayssa Tayachi, Saleh Mulhem, Wael Adi, Laurent Nana, Anca Pascu, Faouzi Benzarti. Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems
20 -- 0Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park 0001, Seokhie Hong. Optimized CSIDH Implementation Using a 2-Torsion Point
21 -- 0Koki Jimbo, Satoshi Iriyama, Massimo Regoli. Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization
22 -- 0Ashutosh Dhar Dwivedi. Security Analysis of Lightweight IoT Cipher: Chaskey
23 -- 0Takeshi Sugawara. Hardware Performance Evaluation of Authenticated Encryption SAEAES with Threshold Implementation
24 -- 0Noah Cowper, Harry Shaw, David R. Thayer. Chaotic Quantum Key Distribution
25 -- 0Georgia Tsaloli, Gustavo Banegas, Aikaterini Mitrokotsa. Practical and Provably Secure Distributed Aggregation: Verifiable Additive Homomorphic Secret Sharing

Volume 4, Issue 2

11 -- 0Mitchell T. Martin, Jim Plusquellic. NotchPUF: Printed Circuit Board PUF Based on Microstrip Notch Filter
12 -- 0Robert Cockell, Basel Halak. On the Design and Analysis of a Biometric Authentication System Using Keystroke Dynamics
13 -- 0Ivan Bow, Nahome Bete, Fareena Saqib, Wenjie Che, Chintan Patel, Ryan W. Robucci, Calvin Chan, Jim Plusquellic. Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity
14 -- 0Aysajan Abidin. On Detecting Relay Attacks on RFID Systems Using Qubits
15 -- 0Mark Randolph, William Diehl. Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
16 -- 0Maki Kihara, Satoshi Iriyama. Security and Performance of Single Sign-on Based on One-Time Pad Algorithm
17 -- 0Bertrand Cambou, Michael Gowanlock, Julie Heynssens, Saloni Jain, Christopher Philabaum, Duane Booher, Ian Burke, Jack Garrard, Donald Telesca, Laurent Njilla. Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions
18 -- 0Mohammed Abu Taha, Wassim Hamidouche, Naty Sidaty, Marko Viitanen, Jarno Vanne, Safwan El Assad, Olivier Déforges. Privacy Protection in Real Time HEVC Standard Using Chaotic System

Volume 4, Issue 1

1 -- 0Emad Hamadaqa, Ayoub Mars, Wael Adi. Physical Security for Fleet Management Systems
2 -- 0Alexander Sauer, Gernot Alber. Quantum Bounds on Detector Efficiencies for Violating Bell Inequalities Using Semidefinite Programming
3 -- 0Damian Markham, Alexandra Krause. A Simple Protocol for Certifying Graph States and Applications in Quantum Networks
4 -- 0. Acknowledgement to Reviewers of Cryptography in 2019
5 -- 0Eric Järpe. An Alternative Diffie-Hellman Protocol
6 -- 0Saleh Mulhem, Ayoub Mars, Wael Adi. Low-Complexity Nonlinear Self-Inverse Permutation for Creating Physically Clone-Resistant Identities
7 -- 0Luca Mazzarella, Christopher J. Lowe, David Lowndes, Siddarth Koduru Joshi, Steve Greenland, Doug McNeil, Cassandra Mercury, Malcolm Macdonald, John G. Rarity, Daniel Kuan Li Oi. QUARC: Quantum Research Cubesat - A Constellation for Quantum Communication
8 -- 0Md Jubayer al Mahmod, Ujjwal Guin. A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications
9 -- 0Reham Almukhlifi, Poorvi L. Vora. Linear Cryptanalysis of Reduced-Round Simon Using Super Rounds
10 -- 0Gorjan Alagic, Stacey Jeffery, Maris Ozols, Alexander Poremba. On Quantum Chosen-Ciphertext Attacks and Learning with Errors