Journal: Cryptography

Volume 6, Issue 4

48 -- 0Jiewen Yao, Krystian Matusiewicz, Vincent Zimmer. Post Quantum Design in SPDM for Device Authentication and Key Establishment
49 -- 0Chia-Hui Wang, Chih-Hao Hsu. Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market
50 -- 0Alfonso B. Labao, Henry N. Adorna. Cryptographic Rational Secret Sharing Schemes over General Networks
51 -- 0Macarena C. Martínez-Rodríguez, Luis F. Rojas-Muñoz, Eros Camacho-Ruiz, Santiago Sánchez-Solano, Piedad Brox. Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems
52 -- 0Ghada Arfaoui, Gildas Avoine, Olivier Gimenez, Jacques Traoré. ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol
53 -- 0Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes, Christos D. Zaroliagis. WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
54 -- 0Thijs Veugen, Bart Kamphorst, Michiel Marcus. Privacy-Preserving Contrastive Explanations with Local Foil Trees
55 -- 0Carlisle Adams. Improving User Privacy in Identity-Based Encryption Environments
56 -- 0Harshana Bandara, Yasitha Herath, Thushara Weerasundara, Janaka Alawatugoda. On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
57 -- 0Alexander Kudzin, Kentaroh Toyoda, Satoshi Takayama, Atsushi Ishigame. Scaling Ethereum 2.0s Cross-Shard Transactions with Refined Data Structures
58 -- 0Mario Ciampi, Diego Romano, Giovanni Schmid. Process Authentication through Blockchain: Three Case Studies
59 -- 0Jim Plusquellic. Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA
60 -- 0Guangwei Zhao, Kaveh Shamsi. Reevaluating Graph-Neural-Network-Based Runtime Prediction of SAT-Based Circuit Deobfuscation
61 -- 0Tao Feng 0007, Jiewen Si. Certificateless Searchable Encryption Scheme in Multi-User Environment
62 -- 0Sneha Chauhan, Sugata Gangopadhyay, Aditi Kar Gangopadhyay. Intrusion Detection System for IoT Using Logical Analysis of Data and Information Gain Ratio
63 -- 0Anant Sujatanagarjuna, Arne Bochem, Benjamin Leiding. Formalizing and Safeguarding Blockchain-Based BlockVoke Protocol as an ACME Extension for Fast Certificate Revocation
64 -- 0Quan Zhou, Zhikang Zeng, Kemeng Wang, Menglong Chen. Privacy Protection Scheme for the Internet of Vehicles Based on Private Set Intersection
65 -- 0Frederick Stock, Yesem Kurt Peker, Alfredo J. Perez, Jarel Hearst. Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things

Volume 6, Issue 3

31 -- 0Anca Radulescu, Marios O. Choudary. Side-Channel Attacks on Masked Bitsliced Implementations of AES
32 -- 0Riccardo Longo, Carla Mascia, Alessio Meneghetti, Giordano Santilli, Giovanni Tognolini. Adaptable Cryptographic Primitives in Blockchains via Smart Contracts
33 -- 0Abigail Akosua Addobea, Qianmu Li, Isaac Amankona Obiri, Jun Hou 0002. A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things
34 -- 0Febrianti Wibawa, Ferhat Özgür Çatak, Salih Sarp, Murat Kuzlu. BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
35 -- 0Yao Zeng, Yuxi Tang, Luping Xiang. Physical Layer Security Design for Polar Code Construction
36 -- 0Brit Riggs, Michael Partridge, Bertrand Cambou, Ian Burke, Manuel Aguilar Rios, Julie Heynssens, Dina Ghanaimiandoab. Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function
37 -- 0Vipin Kumar 0004, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad 0001, Abdul Razaque. Light Weight Authentication Scheme for Smart Home IoT Devices
38 -- 0Donald E. Owen, Jithin Joseph, Jim Plusquellic, Tom J. Mannos, Brian Dziki. Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor
39 -- 0Aritra Banerjee, Hitesh Tewari. Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant
40 -- 0Zulianie Binti Jemihin, Soo-Fun Tan, Gwo Chin Chung. Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey
41 -- 0Görkem Nisanci, Paul G. Flikkema, Tolga Yalçin. Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms
42 -- 0Vasiliki Liagkou, Panayotis E. Nastou, Paul G. Spirakis, Yannis C. Stamatiou. How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem
43 -- 0Rajesh Datta, Guangwei Zhao, Kanad Basu, Kaveh Shamsi. A Security Analysis of Circuit Clock Obfuscation
44 -- 0Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, Herman Fesenko, Oleg Illiashenko. Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems
45 -- 0Kyriaki Tsantikidou, Nicolas Sklavos 0001. Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare
46 -- 0Katarzyna Koptyra, Marek R. Ogiela. Subliminal Channels in Visual Cryptography
47 -- 0Faiza Hashim, Khaled Shuaib, Farag Sallabi. Connected Blockchain Federations for Sharing Electronic Health Records

Volume 6, Issue 2

14 -- 0Timothy Dee, Ian Richardson, Akhilesh Tyagi. Continuous Nonintrusive Mobile Device Soft Keyboard Biometric Authentication
15 -- 0Brian Goncalves, Atefeh Mashatan. Tightly Secure PKE Combiner in the Quantum Random Oracle Model
16 -- 0Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang, Tao Yuan. Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
17 -- 0Antonios Patergianakis, Konstantinos Limniotis. Privacy Issues in Stylometric Methods
18 -- 0Keerthi Nelaturu, Han Du, Duc-Phong Le. A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
19 -- 0Ezinam Bertrand Talaki, Olivier Savry, Mathieu Bouvier Des Noes, David Hély. A Memory Hierarchy Protected against Side-Channel Attacks
20 -- 0Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai. Certificate Management Scheme for VANETs Using Blockchain Structure
21 -- 0Sara D. Cardell, Verónica Requena, Amparo Fúster-Sabater. Computational Analysis of Interleaving PN-Sequences with Different Polynomials
22 -- 0Abhrajit Sengupta, Mohammed Nabeel 0001, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu. A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
23 -- 0Linir Zamir, Mehrdad Nojoumian. Localized State-Change Consensus in Immense and Highly Dynamic Environments
24 -- 0Mohammad Almseidin, Mouhammd Alkasassbeh 0001, Maen Alzubi, Jamil Al-Sawwa. Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation
25 -- 0Binh Kieu-Do-Nguyen, Cuong Pham-Quoc, Ngoc Thinh Tran, Cong-Kha Pham, Trong-Thuc Hoang. Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA
26 -- 0Alessandro Barenghi, Gioele Falcetti, Gerardo Pelosi. Locating Side Channel Leakage in Time through Matched Filters
27 -- 0Bartosz Drzazga, Lukasz Krzywiecki. Review of Chosen Isogeny-Based Cryptographic Schemes
28 -- 0Dina Ibrahim, Kareem Ahmed, Mohamed Abdallah, Abdelmgeid A. Ali. A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix
29 -- 0Damiano Azzolini, Fabrizio Riguzzi. Probabilistic Logic Models for the Lightning Network
30 -- 0Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham, Trong-Thuc Hoang. ChaCha20-Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3

Volume 6, Issue 1

1 -- 0Jongkil Kim, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Intae Kim. Functional Encryption for Pattern Matching with a Hidden String
2 -- 0Alfonso B. Labao, Henry N. Adorna. A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage
3 -- 0Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai. A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
4 -- 0Byoung S. Ham 0001. Network-Compatible Unconditionally Secured Classical Key Distribution via Quantum Superposition-Induced Deterministic Randomness
5 -- 0Shay Gueron, Edoardo Persichetti, Paolo Santini. Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
6 -- 0Jean Belo Klamti, M. Anwar Hasan. Post-Quantum Two-Party Adaptor Signature Based on Coding Theory
7 -- 0. Acknowledgment to Reviewers of Cryptography in 2021
8 -- 0Marius Iulian Mihailescu, Stefania Loredana Nita. A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments
9 -- 0Wenhua Gao, Li Yang, Daode Zhang, Xia Liu. Quantum Identity-Based Encryption from the Learning with Errors Problem
10 -- 0Grzegorz Bazydlo, Remigiusz Wisniewski, Kamil Kozdrój. Trusted and Secure Blockchain-Based Durable Medium Electronic Service
11 -- 0Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe. Preventing Differential Cryptanalysis Attacks Using a KDM Function and the 32-Bit Output S-Boxes on AES Algorithm Found on the Internet of Things Devices
12 -- 0Abdulbast A. Abushgra. Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review
13 -- 0Prastudy Fauzi, Martha Norberg Hovd, Håvard Raddum. On the IND-CCA1 Security of FHE Schemes