Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
 
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
 
The Role of Blockchain in Medical Data Sharing
by Hamed Taherdoost
 
A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability
by Riccardo Della Sala and Giuseppe Scotti
 
A Survey of Consortium Blockchain and Its Applications
by Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng and Chase Q. Wu
 
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
by Harshana Bandara, Yasitha Herath, Thushara Weerasundara and Janaka Alawatugoda
 
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
 
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare
by Kyriaki Tsantikidou and Nicolas Sklavos
 
Connected Blockchain Federations for Sharing Electronic Health Records
by Faiza Hashim, Khaled Shuaib and Farag Sallabi
 
A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem
by Raghunandan Kemmannu Ramesh, Radhakrishna Dodmane, Surendra Shetty, Ganesh Aithal, Monalisa Sahu and Aditya Kumar Sahu
 
Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps
by Mua’ad Abu-Faraj, Abeer Al-Hyari, Charlie Obimbo, Khaled Aldebei, Ismail Altaharwa, Ziad Alqadi and Orabe Almanaseer
Views Article
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
Attacking Windows Hello for Business: Is It What We Were Promised?
by Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden and William J. Buchanan
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
by Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares and Ivo Pereira
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
“Whispers from the Wrist”: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities
by Asma Sifaoui and Matthew S. Eastin
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
by Maksim Iavich and Tamari Kuchukhidze
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
by Kusum Lata and Linga Reddy Cenkeramaddi
Random Number Generators: Principles and Applications
by Anastasios Bikos, Panagiotis E. Nastou, Georgios Petroudis and Yannis C. Stamatiou
The Role of Blockchain in Medical Data Sharing
by Hamed Taherdoost
Downloads Article
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
by Harshana Bandara, Yasitha Herath, Thushara Weerasundara and Janaka Alawatugoda
Physical Visitor Access Control and Authentication Using Blockchain, Smart Contracts and Internet of Things
by Frederick Stock, Yesem Kurt Peker, Alfredo J. Perez and Jarel Hearst
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
by Kusum Lata and Linga Reddy Cenkeramaddi
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
by Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares and Ivo Pereira
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
by Kyriaki Tsantikidou and Nicolas Sklavos
Attacking Windows Hello for Business: Is It What We Were Promised?
by Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden and William J. Buchanan
A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework
by Ivar Walskaar, Minh Christian Tran and Ferhat Ozgur Catak
Back to TopTop