27 | -- | 0 | Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, Isa Inuwa-Dutse, Saad Khan 0001, Simon Parkinson. The Emerging Challenges of Wearable Biometric Cryptosystems |
28 | -- | 0 | Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Dzianis Kanonik, Kateryna Kuznetsova, Oleksandr Domin. Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation |
29 | -- | 0 | Javier de la Cruz, Edgar Martínez-Moro, Steven Muñoz-Ruiz, Ricardo Villanueva-Polanco. Public Key Protocols from Twisted-Skew Group Rings |
30 | -- | 0 | Mario Alviano, Giada Gabriele. Improve Parallel Resistance of Hashcash Tree |
31 | -- | 0 | Dana Sairangazhykyzy Amirkhanova, Maksim Iavich, Orken Mamyrbayev. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles |
32 | -- | 0 | Jenilee Jao, Ian Wilcox, Jim Plusquellic, Biliana S. Paskaleva, Pavel B. Bochev. Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions |
33 | -- | 0 | Oleksandr Kuznetsov, Alex Rusnak, Anton Yezhov, Kateryna Kuznetsova, Dzianis Kanonik, Oleksandr Domin. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities |
34 | -- | 0 | Zichu Liu, Jia Hou, Jianfei Wang 0003, Chen Yang 0005. A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator |
35 | -- | 0 | George Teseleanu. A Note on the Quasigroup of Lai-Massey Structures |
36 | -- | 0 | Jaya Dofe, Wafi Danesh, Vaishnavi More, Aaditya Chaudhari. Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs |
37 | -- | 0 | Jinhui Liu, Tianyi Han, Maolin Tan, Bo Tang, Wei Hu 0008, Yong Yu 0002. RETRACTED: Liu et al. A Publicly Verifiable E-Voting System Based on Biometrics. Cryptography 2023, 7, 62 |
38 | -- | 0 | Anatoly Bessalov, Volodymyr Sokolov, Serhii Abramov. Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves |
39 | -- | 0 | Komala Rangappa, Arun Kumar Banavara Ramaswamy, Mahadeshwara Prasad, Shreyas Arun Kumar. A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment |
40 | -- | 0 | Riley Vaughn, Mike Borowczak. Strict Avalanche Criterion of SHA-256 and Sub-Function-Removed Variants |
41 | -- | 0 | Ching-Chun Chang, Shuying Xu, Kai Gao, Chin-Chen Chang 0001. Cryptanalysis of Dual-Stage Permutation Encryption Using Large-Kernel Convolutional Neural Network and Known Plaintext Attack |
42 | -- | 0 | Xingan Dai, Xinquan Zhou, Dehua Zhou, Jinhan Zhong, Chao Hong. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts |
43 | -- | 0 | Ahmad Kabil, Heba Aslan, Marianne A. Azer, Mohamed Rasslan. CHAM-CLAS: A Certificateless Aggregate Signature Scheme with Chameleon Hashing-Based Identity Authentication for VANETs |