Journal: Cryptography

Volume 8, Issue 4

44 -- 0Mohammed Rahmani, Abderrahmane Nitaj, M'hammed Ziane. Partial Exposure Attacks on a New RSA Variant
45 -- 0Mijail Borges-Quintana, Miguel A. Borges-Trenard, Osmani Tito-Corrioso, Omar Rojas, Guillermo Sosa Gómez. Combined and General Methodologies of Key Space Partition for the Cryptanalysis of Block Ciphers
46 -- 0Cyrus Minwalla, Jim Plusquellic, Eirini-Eleni Tsiropoulou. Lightweight Mutually Authenticated Key Exchange with Physical Unclonable Functions
47 -- 0Saadia Aziz, Ijaz Ali Shoukat, Mohsin Iftikhar, Mohsin Murtaza, Abdulmajeed M. Alenezi, Cheng-Chi Lee, Imran Taj. Next-Generation Block Ciphers: Achieving Superior Memory Efficiency and Cryptographic Robustness for IoT Devices
48 -- 0Wen Gao 0010, Haoyuan Yao, Baodong Qin, Xiaoli Dong, Zhen Zhao 0005, Jiayu Zeng. Post-Quantum Secure ID-Based (Threshold) Linkable Dual-Ring Signature and Its Application in Blockchain Transactions
49 -- 0Zeeshan Ashraf, Adnan Sohail, Muddesar Iqbal. Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
50 -- 0Shaoquan Jiang. Quantum Security of a Compact Multi-Signature
51 -- 0Laerte Peotta de Melo, Dino Macedo Amaral, Robson de Oliveira Albuquerque, Rafael Timóteo de Sousa Júnior, Ana Lucila Sandoval Orozco, Luis Javier García-Villalba. A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol
52 -- 0Ghassan Hameed Faraj, Kamal Shahtalebi, Hamid Mala. An Anonymous Authenticated Key Agreement Scheme for Telecare Medical Information Systems
53 -- 0Luigi Catuogno, Clemente Galdi. Implantable Medical Device Security
54 -- 0Evaristo José Madarro-Capó, Carlos Miguel Legón-Pérez, Guillermo Sosa Gómez, Omar Rojas. New Weak Keys with Parity Patterns in the RC4 Stream Cipher
55 -- 0Indrakanti Aishwarya, Lakshmy Koduvayur Viswanathan, Chungath Srinivasan, Girish Mishra, Saibal K. Pal, M. Sethumadhavan 0001. Improving the Security of the LCB Block Cipher Against Deep Learning-Based Attacks
56 -- 0Luis Adrián Lizama-Pérez. A Matrix Multiplication Approach to Quantum-Safe Cryptographic Systems
57 -- 0Chen Wang, Zi-Yuan Liu, Masahiro Mambo. On the Proof of Ownership of Digital Wallets
58 -- 0Shengnan Zhao, Chuan Zhao, Yuchen Huang, Xiangfu Song, Qiuliang Xu. Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives

Volume 8, Issue 3

27 -- 0Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, Isa Inuwa-Dutse, Saad Khan 0001, Simon Parkinson. The Emerging Challenges of Wearable Biometric Cryptosystems
28 -- 0Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Dzianis Kanonik, Kateryna Kuznetsova, Oleksandr Domin. Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation
29 -- 0Javier de la Cruz, Edgar Martínez-Moro, Steven Muñoz-Ruiz, Ricardo Villanueva-Polanco. Public Key Protocols from Twisted-Skew Group Rings
30 -- 0Mario Alviano, Giada Gabriele. Improve Parallel Resistance of Hashcash Tree
31 -- 0Dana Sairangazhykyzy Amirkhanova, Maksim Iavich, Orken Mamyrbayev. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles
32 -- 0Jenilee Jao, Ian Wilcox, Jim Plusquellic, Biliana S. Paskaleva, Pavel B. Bochev. Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions
33 -- 0Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Kateryna Kuznetsova, Dzianis Kanonik, Oleksandr Domin. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities
34 -- 0Zichu Liu, Jia Hou, Jianfei Wang 0003, Chen Yang 0005. A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator
35 -- 0George Teseleanu. A Note on the Quasigroup of Lai-Massey Structures
36 -- 0Jaya Dofe, Wafi Danesh, Vaishnavi More, Aaditya Chaudhari. Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs
37 -- 0Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu 0008, Yong Yu 0002. RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62
38 -- 0Anatoly Bessalov, Volodymyr Sokolov, Serhii Abramov. Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves
39 -- 0Komala Rangappa, Arun Kumar Banavara Ramaswamy, Mahadeshwara Prasad, Shreyas Arun Kumar. A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment
40 -- 0Riley Vaughn, Mike Borowczak. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants
41 -- 0Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang 0001. Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack
42 -- 0Xingan Dai, Xinquan Zhou, Dehua Zhou, Jinhan Zhong, Chao Hong. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts
43 -- 0Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan. CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs

Volume 8, Issue 2

12 -- 0Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng, Chase Q. Wu. A Survey of Consortium Blockchain and Its Applications
13 -- 0Minyan Gao, Liton Kumar Biswas, Navid Asadi, Domenic Forte. Detour-RS: Reroute Attack Vulnerability Assessment with Awareness of the Layout and Resource
14 -- 0Maksymilian Gorski, Wojciech Wodo. Analysis of Biometric-Based Cryptographic Key Exchange Protocols - BAKE and BRAKE
15 -- 0Maksim Iavich, Tamari Kuchukhidze. Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
16 -- 0Idris Somoye, Jim Plusquellic, Tom J. Mannos, Brian Dziki. An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor
17 -- 0Oleksandr Kuznetsov, Nikolay Poluyanenko, Emanuele Frontoni, Sergey Kandiy. Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography
18 -- 0Peng Zhang 0029, Ao Duan, Hengrui Lu. An Efficient Homomorphic Argmax Approximation for Privacy-Preserving Neural Networks
19 -- 0Ádám Vécsi, Attila Pethö. Auditable Anonymous Electronic Examination
20 -- 0Zahraa Abdullah Ali, Zaid Ameen Abduljabbar, Hamid Ali Abed Al-Asadi, Vincent Omollo Nyangaresi, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish. A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids
21 -- 0Gregory Fitzgibbon, Carlo Ottaviani. Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
22 -- 0Gregor Haywood, Saleem N. Bhatti. Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths
23 -- 0Lahraoui Younes, Saiida Lazaar, Amal Youssef, Abderrahmane Nitaj. Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance
24 -- 0Abdullah Aljuffri, Ruoyu Huang, Laura Muntenaar, Georgi Gaydadjiev, Kezheng Ma, Said Hamdioui, Mottaqiallah Taouil. The Security Evaluation of an Efficient Lightweight AES Accelerator
25 -- 0Chunlei Li 0001. A Survey on Complexity Measures for Pseudo-Random Sequences
26 -- 0Asma Sifaoui, Matthew S. Eastin. "Whispers from the Wrist": Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities

Volume 8, Issue 1

1 -- 0Ravikumar Selvam, Akhilesh Tyagi. Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks
2 -- 0Devanshi Upadhyaya, Maël Gay, Ilia Polian. Locking-Enabled Security Analysis of Cryptographic Circuits
3 -- 0Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang. Novel and Efficient Privacy-Preserving Continuous Authentication
4 -- 0Ahmad Kabil, Heba Aslan, Marianne Azer. Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks
5 -- 0Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao 0005, Zung Le. Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
6 -- 0Chang Chen, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, Jin Li. Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols
7 -- 0Kyriaki Tsantikidou, Nicolas Sklavos 0001. Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
8 -- 0Sagarika Behera, Prathuri Jhansi Rani. FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data
9 -- 0Hakan Uzuner, Elif Bilge Kavun. NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V
10 -- 0Francesc Sebé, Sergi Simón. E-Coin-Based Priced Oblivious Transfer with a Fast Item Retrieval
11 -- 0Yan-Duan Ning, Yan-Haw Chen, Cheng-Sin Shih, Shao-I Chu. Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography