Need Help?
Most Cited & Viewed
Most Cited & Viewed Papers
Citations | Article |
---|---|
Light Weight Authentication Scheme for Smart Home IoT Devices
by
Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
|
|
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by
Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
|
|
Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems
by
Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, Herman Fesenko and Oleg Illiashenko
|
|
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
by
Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp and Murat Kuzlu
|
|
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare
by
Kyriaki Tsantikidou and Nicolas Sklavos
|
|
Connected Blockchain Federations for Sharing Electronic Health Records
by
Faiza Hashim, Khaled Shuaib and Farag Sallabi
|
|
A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix
by
Dina Ibrahim, Kareem Ahmed, Mohamed Abdallah and AbdElmgeid A. Ali
|
|
A Survey of Post-Quantum Cryptography: Start of a New Race
by
Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
|
|
Efficient RO-PUF for Generation of Identifiers and Keys in Resource-Constrained Embedded Systems
by
Macarena C. Martínez-Rodríguez, Luis F. Rojas-Muñoz, Eros Camacho-Ruiz, Santiago Sánchez-Solano and Piedad Brox
|
|
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors
by
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, Mohammad Alshinwan, Sultan Alamri, Samer Atawneh and Mutasem K. Alsmadi
|
Citations | Article |
---|---|
Comparative Study of Keccak SHA-3 Implementations
by
Alessandra Dolmeta, Maurizio Martina and Guido Masera
|
|
One-to-Many Simultaneous Secure Quantum Information Transmission
by
Theodore Andronikos and Alla Sirokofskich
|
|
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks
by
Ahmad Mohamad Kabil, Heba Aslan and Marianne Azer
|
|
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V
by
Geraldine Shirley Nicholas, Dhruvakumar Vikas Aklekar, Bhavin Thakar and Fareena Saqib
|
Citations | Article |
---|---|
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives
by
Asad Ali Siyal, Aisha Zahid Junejo, Muhammad Zawish, Kainat Ahmed, Aiman Khalil and Georgia Soursou
|
|
Multi-Factor Authentication: A Survey
by
Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen and Yevgeni Koucheryavy
|
|
Provably Secure Covert Communication on Blockchain
by
Juha Partala
|
|
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
by
Mark Randolph and William Diehl
|
|
QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication
by
Luca Mazzarella, Christopher Lowe, David Lowndes, Siddarth Koduru Joshi, Steve Greenland, Doug McNeil, Cassandra Mercury, Malcolm Macdonald, John Rarity and Daniel Kuan Li Oi
|
|
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems
by
Diego Romano and Giovanni Schmid
|
|
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol
by
Wenjie Che, Mitchell Martin, Goutham Pocklassery, Venkata K. Kajuluri, Fareena Saqib and Jim Plusquellic
|
|
Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions
by
Daniel G. Costa, Solenir Figuerêdo and Gledson Oliveira
|
|
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by
Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
|
|
Multiparty Delegated Quantum Computing
by
Elham Kashefi and Anna Pappa
|
Views | Article |
---|---|
Attacking Windows Hello for Business: Is It What We Were Promised?
by
Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden and William J. Buchanan
|
|
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by
Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
|
|
A Survey of Post-Quantum Cryptography: Start of a New Race
by
Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
|
|
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by
Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
|
|
Applications of Neural Network-Based AI in Cryptography
by
Abderrahmane Nitaj and Tajjeeddine Rachidi
|
|
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
by
Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp and Murat Kuzlu
|
|
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
by
Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes and Christos Zaroliagis
|
|
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare
by
Kyriaki Tsantikidou and Nicolas Sklavos
|
|
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
by
Harshana Bandara, Yasitha Herath, Thushara Weerasundara and Janaka Alawatugoda
|
|
Light Weight Authentication Scheme for Smart Home IoT Devices
by
Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
|
Views | Article |
---|---|
A Survey of Post-Quantum Cryptography: Start of a New Race
by
Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
|
|
Applications of Neural Network-Based AI in Cryptography
by
Abderrahmane Nitaj and Tajjeeddine Rachidi
|
|
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
by
Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares and Ivo Pereira
|
|
The Role of Blockchain in Medical Data Sharing
by
Hamed Taherdoost
|
|
Random Number Generators: Principles and Applications
by
Anastasios Bikos, Panagiotis E. Nastou, Georgios Petroudis and Yannis C. Stamatiou
|
|
Secure Firmware Update: Challenges and Solutions
by
Luigi Catuogno and Clemente Galdi
|
|
Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications
by
Luis Parrilla, Antonio García, Encarnación Castillo, Juan Antonio López-Villanueva and Uwe Meyer-Baese
|
|
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
by
Kusum Lata and Linga Reddy Cenkeramaddi
|
|
Comparative Study of Keccak SHA-3 Implementations
by
Alessandra Dolmeta, Maurizio Martina and Guido Masera
|