Journal: Cryptography

Volume 5, Issue 4

26 -- 0Julian Danner, Martin Kreuzer. A Fault Attack on the Family of Enocoro Stream Ciphers
27 -- 0Mohammad Anagreh, Peeter Laud, Eero Vainikko. Parallel Privacy-Preserving Shortest Path Algorithms
28 -- 0Hossein Sayadi, Yifeng Gao, Hosein Mohammadi Makrani, Jessica Lin 0001, Paulo Cesar G. da Costa, Setareh Rafatirad, Houman Homayoun. Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
29 -- 0Irene Ioannidou, Nicolas Sklavos 0001. On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications
30 -- 0Bang Yuan Chong, Iftekhar Salam. Investigating Deep Learning Approaches on the Security Analysis of Cryptographic Algorithms
31 -- 0Alessandro Budroni, Qian Guo 0001, Thomas Johansson 0001, Erik Mårtensson, Paul Stankovski Wagner. Improvements on Making BKW Practical for Solving LWE
32 -- 0Emad Hamadaqa, Saleh Mulhem, Wael Adi, Mladen Berekovic. Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies
33 -- 0Johann-Philipp Thiers, Jürgen Freudenberger. Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography
34 -- 0Konstantinos Limniotis. Cryptography as the Means to Protect Fundamental Human Rights
35 -- 0K. S. Suvidha, Jothi Rangasamy, Shyam S. Kamath, Cheng-Chi Lee. ES-HAS: ECC-Based Secure Handover Authentication Scheme for Roaming Mobile User in Global Mobility Networks
36 -- 0Diego Romano, Giovanni Schmid. Beyond Bitcoin: Recent Trends and Perspectives in Distributed Ledger Technology
37 -- 0Noha Ezzat El-Attar, Doaa S. El-Morshedy, Wael A. Awad. A New Hybrid Automated Security Framework to Cloud Storage System
38 -- 0Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan, Muttukrishnan Rajarajan. Post-Quantum and Code-Based Cryptography - Some Prospective Research Directions

Volume 5, Issue 3

16 -- 0Davide Bellizia, Riccardo Della Sala, Giuseppe Scotti. SC-DDPL as a Countermeasure against Static Power Side-Channel Attacks
17 -- 0Hibiki Ono, Yoshifumi Manabe. Minimum Round Card-Based Cryptographic Protocols Using Private Operations
18 -- 0Yutian Gui, Chaitanya Bhure, Marcus Hughes, Fareena Saqib. A Delay-Based Machine Learning Model for DMA Attack Mitigation
19 -- 0Minhye Seo. Fair and Secure Multi-Party Computation with Cheater Detection
20 -- 0Kabiru Mohammed, Aladdin Ayesh, Eerke A. Boiten. Complementing Privacy and Utility Trade-Off with Self-Organising Maps
21 -- 0Andre Ostrak, Jaak Randmets, Ville Sokk, Sven Laur, Liina Kamm. Implementing Privacy-Preserving Genotype Analysis with Consideration for Population Stratification
22 -- 0Sven Laur, Pille Pullonen-Raudvere. Foundations of Programmable Secure Computation
23 -- 0Riccardo Della Sala, Davide Bellizia, Giuseppe Scotti. A Novel Ultra-Compact FPGA PUF: The DD-PUF
24 -- 0Dor Salomon, Amir Weiss, Itamar Levi. Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis
25 -- 0Netanel Klein, Eyal Harel, Itamar Levi. The Cost of a True Random Bit - On the Electronic Cost Gain of ASIC Time-Domain-Based TRNGs

Volume 5, Issue 2

12 -- 0Yu-Cheng Chen, Vincent John Mooney, Santiago Grijalva. Grid Cyber-Security Strategy in an Attacker-Defender Model
13 -- 0Ehsan Aerabi, David Hély, Cyril Bresch, Athanasios Papadimitriou, Mahdi Fazeli. CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes
14 -- 0Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila. Associative Blockchain for Decentralized PKI Transparency
15 -- 0Jacob T. Grycel, Patrick Schaumont. SimpliFI: Hardware Simulation of Embedded Software Fault Attacks

Volume 5, Issue 1

1 -- 0Sarah A. Alzakari, Poorvi L. Vora. Partly-Pseudo-Linear Cryptanalysis of Reduced-Round Speck
2 -- 0Tushar Kanti Saha, Takeshi Koshiba. Efficient Private Conjunctive Query Protocol Over Encrypted Data
3 -- 0Alexandru Cojocaru, Léo Colisson, Elham Kashefi, Petros Wallden. On the Possibility of Classical Client Blind Quantum Computing
4 -- 0Bayan Alabdullah, Natalia Beloff, Martin White. E-ART: A New Encryption Algorithm Based on the Reflection of Binary Search Tree
5 -- 0. Acknowledgment to Reviewers of Cryptography in 2020
6 -- 0Malek Safieh, Jürgen Freudenberger. Montgomery Reduction for Gaussian Integers
7 -- 0Holden Gordon, Jack Edmonds, Soroor Ghandali, Wei Yan 0005, Nima Karimian, Fatemeh Tehranipoor. Flash-Based Security Primitives: Evolution, Challenges and Future Directions
8 -- 0Bertrand Cambou, Donald Telesca, Sareh Assiri, Michael Garrett, Saloni Jain, Michael Partridge. TRNGs from Pre-Formed ReRAM Arrays
9 -- 0Mukhil Azhagan Mallaiyan Sathiaseelan, Olivia P. Paradis, Shayan Taheri, Navid Asadizanjani. Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?
10 -- 0Niluka Amarasinghe, Xavier Boyen, Matthew McKague. The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
11 -- 0Jürgen Freudenberger, Johann-Philipp Thiers. A New Class of Q-Ary Codes for the McEliece Cryptosystem