| 27 | -- | 0 | Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, Isa Inuwa-Dutse, Saad Khan 0001, Simon Parkinson. The Emerging Challenges of Wearable Biometric Cryptosystems |
| 28 | -- | 0 | Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Dzianis Kanonik, Kateryna Kuznetsova, Oleksandr Domin. Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation |
| 29 | -- | 0 | Javier de la Cruz, Edgar Martínez-Moro, Steven Muñoz-Ruiz, Ricardo Villanueva-Polanco. Public Key Protocols from Twisted-Skew Group Rings |
| 30 | -- | 0 | Mario Alviano, Giada Gabriele. Improve Parallel Resistance of Hashcash Tree |
| 31 | -- | 0 | Dana Sairangazhykyzy Amirkhanova, Maksim Iavich, Orken Mamyrbayev. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles |
| 32 | -- | 0 | Jenilee Jao, Ian Wilcox, Jim Plusquellic, Biliana S. Paskaleva, Pavel B. Bochev. Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions |
| 33 | -- | 0 | Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Kateryna Kuznetsova, Dzianis Kanonik, Oleksandr Domin. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities |
| 34 | -- | 0 | Zichu Liu, Jia Hou, Jianfei Wang 0003, Chen Yang 0005. A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator |
| 35 | -- | 0 | George Teseleanu. A Note on the Quasigroup of Lai-Massey Structures |
| 36 | -- | 0 | Jaya Dofe, Wafi Danesh, Vaishnavi More, Aaditya Chaudhari. Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs |
| 37 | -- | 0 | Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu 0008, Yong Yu 0002. RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62 |
| 38 | -- | 0 | Anatoly Bessalov, Volodymyr Sokolov, Serhii Abramov. Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves |
| 39 | -- | 0 | Komala Rangappa, Arun Kumar Banavara Ramaswamy, Mahadeshwara Prasad, Shreyas Arun Kumar. A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment |
| 40 | -- | 0 | Riley Vaughn, Mike Borowczak. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants |
| 41 | -- | 0 | Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang 0001. Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack |
| 42 | -- | 0 | Xingan Dai, Xinquan Zhou, Dehua Zhou, Jinhan Zhong, Chao Hong. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts |
| 43 | -- | 0 | Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan. CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs |