首页
OALib 期刊
快速投稿通道
我的图书馆
常见问题
关于我们
关注我们+
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
LinkedIn (OALib Group)
LinkedIn (OALib Company Page)
Facebook
Twitter
全部
标题
作者
关键词
摘要
OALib Journal期刊
ISSN: 2333-9721
费用:99美元
投递稿件
为什么选择我们?
>>
- 开源期刊
- 同行审议
- 快速出刊
- 终身存储
- 免费检索
- 免费推广
- 更多...
- 搜索引擎
-
ISSN Print:
ISSN Online:
主页:
https://www.mdpi.com/journal/cryptography
分享:
Go
A New Class of Strongly Asymmetric PKA Algorithms: SAA-5
Koki Jimbo
,
Luigi Accardi
,
Massimo Regoli
,
Satoshi Iriyama
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes
Dawood Shah
,
Sadam Hussain
,
Tariq Shah
,
Yasir Naseer
Automating Privacy Compliance Using Policy Integrated Blockchain
Agniva Banerjee
,
Karuna Pande Joshi
Further Observations on SIMON and SPECK Block Cipher Families
Seyed Mojtaba Dehnavi
New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method
Faridah Yunos
,
Muhammad Asyraf Asbullah
,
Muhammad Rezal Kamel Ariffin
,
Saidu Isah Abubakar
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM
Ashutosh Dhar Dwivedi
,
Gautam Srivastava
,
Rajani Singh
,
Shalini Dhar
Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors
Marten van Dijk
,
Syed Kamran Haider
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives
Aiman Khalil
,
Aisha Zahid Junejo
,
Asad Ali Siyal
,
Georgia Soursou
,
Kainat Ahmed
,
Muhammad Zawish
An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow
Le Van Luyen
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures
Ayoub Mars
,
Wael Adi
Optimized AKS Primality Testing: A Fluctuation Theory Perspective
Bhupendra Nath Tiwari
,
Joshua M. Adeegbe
,
Jude Kibinde Kuipo
,
Ninoslav Marina
An Enhanced Key Management Scheme for LoRaWAN
Jialuo Han
,
Jidong Wang
Redundancy in Key Management for WSNs
Bartolomeo Montrucchio
,
Filippo Gandino
,
Maurizio Rebaudengo
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
N.B. Gayathri
,
P. Vasudeva Reddy
,
Salome James
On the Performance and Security of Multiplication in GF(2N)
Adrien Facon
,
Alexander Schaub
,
Cheikh T. Gueye
,
Edoardo Persichetti
,
Jean-Luc Danger
,
Ousmane Ndiaye
,
Sylvain Guilley
,
Sylvie Herbel
,
Youssef El Housni
Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn
Angela Robinson
,
María Isabel González Vasco
,
Rainer Steinwandt
Multi-Factor Authentication: A Survey?
Aleksandr Ometov
,
Niko M?kitalo
,
Sergey Andreev
,
Sergey Bezzateev
,
Tommi Mikkonen
,
Yevgeni Koucheryavy
A New Technique in Rank Metric Code-Based Encryption?
Chik How Tan
,
Terry Shue Chien Lau
An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays
Calvin Chan
,
Derek Heeger
,
Don Owen Jr.
,
Fareena Saqib
,
Jim Plusquellic
,
Matt Areno
,
Wenjie Che
ReSOLV: Applying Cryptocurrency Blockchain Methods to Enable Global Cross-Platform Software License Validation
Alan Litchfield
,
Jeff Herbert
An Overview of DRAM-Based Security Primitives
Fatemeh Tehranipoor
,
John Chandy
,
Nikolaos Athanasios Anagnostopoulos
,
Stefan Katzenbeisser
Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
Donghoon Chang
,
Jinkeon Kang
,
Megha Agrawal
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion
Jonathan Trostle
Barrel Shifter Physical Unclonable Function Based Encryption
Akhilesh Tyagi
,
Timothy Dee
,
Yunxi Guo
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
Iftekhar Salam
,
Kenneth Koon-Ho Wong
Can Ternary Computing Improve Information Assurance?
Bertrand Cambou
,
Christopher Philabaum
,
Donald Telesca
,
James Palmer
,
Paul G. Flikkema
Designing Secure Heterogeneous Multicore Systems from Untrusted Components
Lake Bu
,
Michel A. Kinsy
,
Miguel Mark
,
Mihailo Isakov
Hardware-Based Run-Time Code Integrity in Embedded Devices
David Keezer
,
Taimour Wehbe
,
Vincent Mooney
Sequential Hashing with Minimum Padding
Shoichi Hirose
Forward-Secure Linkable Ring Signatures from Bilinear Maps
Thomas Haines
,
Xavier Boyen
An Attack Bound for Small Multiplicative Inverse of φ(N) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques
Lambadi Jyotsna
,
Pratha Anuradha Kameswari
Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers?
Abubakr Abdulgadir
,
Farnoud Farahmand
,
Jens-Peter Kaps
,
Kris Gaj
,
William Diehl
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security ?
André Schaller
,
Christian Hatzfeld
,
Jakub Szefer
,
Jan Lotichius
,
Manishkumar Jain
,
Muhammad Umair Saleem
,
Nikolaos Athanasios Anagnostopoulos
,
Sebastian Gabmeyer
,
Stefan Katzenbeisser
,
Tolga Arul
,
Wenjie Xiong
,
Yufan Fan
Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics ?
B. M. S. Bahar Talukder
,
Biswajit Ray
,
Md Tauhidur Rahman
,
Preeti Kumari
,
Sadman Sakib
A Secure Algorithm for Inversion Modulo 2k
Carles Ferrer
,
Sadiel De la Fe
Kolmogorov One-Way Functions Revisited
André Souto
,
Filipe Casal
,
Jo?o Rasga
Revocable Identity-Based Encryption and Server-Aided Revocable IBE from the Computational Diffie-Hellman Assumption?
Joseph K. Liu
,
Kefei Chen
,
Shengli Liu
,
Ziyuan Hu
A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion
Bo-Yuan Huang
,
Justie Su-Tzu Juan
,
Ying-Yu Chen
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
Adrian Kotelba
,
Jani Suomalainen
,
Jari Kreku
,
Sami Lehtonen
A New Visual Multi-Secrets Sharing Scheme by Random Grids
Bo-Yuan Huang
,
Joy Jo-Yi Chang
,
Justie Su-Tzu Juan
An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments
Balaji Chandrasekaran
,
Ramadoss Balakrishnan
Provably Secure Covert Communication on Blockchain
Juha Partala
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment
Edoardo Persichetti
Security and Cryptographic Challenges for Authentication Based on Biometrics Data
Marius Iulian Mihailescu
,
Stefania Loredana Nita
,
Valentin Corneliu Pau
Security Incident Information Exchange for Cloud Service Provisioning Chains
Christian Fr?ystad
,
Inger Anne T?ndel
,
Martin Gilje Jaatun
Robust Secure Authentication and Data Storage with Perfect Secrecy
Holger Boche
,
Sebastian Baur
Correlation-Based Robust Authentication (Cobra) Using Helper Data Only
Jim Plusquellic
,
Matt Areno
On the Cryptographic Features of a VoIP Service
Dimitrios Alvanos
,
Konstantinos Limniotis
,
Stavros Stavrou
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity
James Jin Kang
,
Kiran Fahd
,
Sitalakshmi Venkatraman
The Definition and Software Performance of Hashstream, a Fast Length-Flexible PRF
Ted Krovetz
Go