Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 320 results
Sort by: relevance publication year

Foundations of Programmable Secure Computation

JOURNAL ARTICLE published 21 August 2021 in Cryptography

Research funded by Estonian Personal Research Grant (920)

Authors: Sven Laur | Pille Pullonen-Raudvere

Implementation of a New Strongly-Asymmetric Algorithm and Its Optimization

JOURNAL ARTICLE published 30 July 2020 in Cryptography

Authors: Koki Jimbo | Satoshi Iriyama | Massimo Regoli

Random Number Generators: Principles and Applications

JOURNAL ARTICLE published 30 October 2023 in Cryptography

Authors: Anastasios Bikos | Panagiotis E. Nastou | Georgios Petroudis | Yannis C. Stamatiou

Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources

JOURNAL ARTICLE published 13 November 2020 in Cryptography

Authors: Georgios M. Nikolopoulos | Marc Fischlin

An Engineered Minimal-Set Stimulus for Periodic Information Leakage Fault Detection on a RISC-V Microprocessor

JOURNAL ARTICLE published 22 April 2024 in Cryptography

Authors: Idris O. Somoye | Jim Plusquellic | Tom J. Mannos | Brian Dziki

Generalized Concatenated Codes over Gaussian and Eisenstein Integers for Code-Based Cryptography

JOURNAL ARTICLE published 29 November 2021 in Cryptography

Research funded by Federal Ministry of Education and Research (16ES1045)

Authors: Johann-Philipp Thiers | Jürgen Freudenberger

Blockchain of Resource-Efficient Anonymity Protection with Watermarking for IoT Big Data Market

JOURNAL ARTICLE published 30 September 2022 in Cryptography

Research funded by Ministry of Science and Technology, Taiwan (MOST 110-2221-E-130-001)

Authors: Chia-Hui Wang | Chih-Hao Hsu

Quantum Identity-Based Encryption from the Learning with Errors Problem

JOURNAL ARTICLE published 16 February 2022 in Cryptography

Authors: Wenhua Gao | Li Yang | Daode Zhang | Xia Liu

Security Analysis of Lightweight IoT Cipher: Chaskey

JOURNAL ARTICLE published 5 August 2020 in Cryptography

Authors: Ashutosh Dhar Dwivedi

Can Ternary Computing Improve Information Assurance?

JOURNAL ARTICLE published 2 March 2018 in Cryptography

Research funded by US Air Force (FA8075-16-D-0001)

Authors: Bertrand Cambou | Paul Flikkema | James Palmer | Donald Telesca | Christopher Philabaum

Novel and Efficient Privacy-Preserving Continuous Authentication

JOURNAL ARTICLE published 24 January 2024 in Cryptography

Research funded by European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie (860315)

Authors: Ahmed Fraz Baig | Sigurd Eskeland | Bian Yang

Attacking Windows Hello for Business: Is It What We Were Promised?

JOURNAL ARTICLE published 14 February 2023 in Cryptography

Research funded by Horizon Europe Project Trust (GA 101070214)

Authors: Joseph Haddad | Nikolaos Pitropakis | Christos Chrysoulas | Mouad Lemoudden | William J. Buchanan

Shift Register, Reconvergent-Fanout (SiRF) PUF Implementation on an FPGA

JOURNAL ARTICLE published 11 November 2022 in Cryptography

Authors: Jim Plusquellic

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures

JOURNAL ARTICLE published 31 January 2024 in Cryptography

Authors: Yinhao Jiang | Mir Ali Rezazadeh Baee | Leonie Ruth Simpson | Praveen Gauravaram | Josef Pieprzyk | Tanveer Zia | Zhen Zhao | Zung Le

Correlation-Based Robust Authentication (Cobra) Using Helper Data Only

JOURNAL ARTICLE published 31 August 2018 in Cryptography

Authors: Jim Plusquellic | Matt Areno

CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion

JOURNAL ARTICLE published 19 December 2018 in Cryptography

Authors: Jonathan Trostle

A Text-Independent Speaker Authentication System for Mobile Devices

JOURNAL ARTICLE published 22 September 2017 in Cryptography

Authors: Florentin Thullier | Bruno Bouchard | Bob-Antoine Menelas

Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

JOURNAL ARTICLE published 7 April 2023 in Cryptography

Authors: Mua’ad Abu-Faraj | Abeer Al-Hyari | Charlie Obimbo | Khaled Aldebei | Ismail Altaharwa | Ziad Alqadi | Orabe Almanaseer

Multiverse of HawkNess: A Universally-Composable MPC-Based Hawk Variant

JOURNAL ARTICLE published 4 August 2022 in Cryptography

Research funded by Science Foundation Ireland (13/RC/2106,17/SP/5447)

Authors: Aritra Banerjee | Hitesh Tewari

An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays

JOURNAL ARTICLE published 18 July 2018 in Cryptography

Authors: Don Owen Jr. | Derek Heeger | Calvin Chan | Wenjie Che | Fareena Saqib | Matt Areno | Jim Plusquellic