


default search action
Cryptography, Volume 10
Volume 10, Number 1, 2025
- Yijia Dai, Yitong Li

, Ye Yuan, Xianwei Gao, Cong Bian, Meici Liu:
DLR-Auth: A Decentralized Lightweight and Revocable Authentication Framework for the Industrial Internet of Things. 1 - Zhaoxiong Meng

, Rukui Zhang, Bin Cao, Meng Zhang, Yajun Li, Huhu Xue, Meimei Yang:
AI-Enhanced Perceptual Hashing with Blockchain for Secure and Transparent Digital Copyright Management. 2 - Xinyao Li

, Akhilesh Tyagi
:
Large Pages, Large Leaks? Hugepage-Induced Side-Channels vs. Performance Improvements in Cryptographic Computations. 3 - Bashar Suhail Khassawneh

, Issa Al-Aiash, Mahmoud AlJamal
, Omar Aljamal, Latifa Abdullah Almusfar
, Bashair Althani
, Waad Aldossary:
Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization. 4 - Tongchen Shen, Xiangxue Li, Licheng Wang:

Lower Bound on the Overlattice-Based Sieve Algorithm. 5 - Asmaa Kassimi

, Abdullah Aljuffri
, Christian Larmann
, Said Hamdioui
, Mottaqiallah Taouil
:
Secure Implementation of RISC-V's Scalar Cryptography Extension Set. 6 - Daniel Alarcón-Narváez, Luis Adrián Lizama-Pérez

, Fausto Abraham Jacques-García
:
Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge-Response Authentication. 7 - Adrian Donatien-Charon

, Mijail Borges-Quintana
, Miguel A. Borges-Trenard
, Omar Rojas
, Guillermo Sosa-Gómez
:
On Tabu Search for Block Cyphers Cryptanalysis. 8 - Jimmy Dani

, Kalyan Nakka
, Nitesh Saxena
:
MIND-Crypt: A Machine Learning Framework for Assessing the Indistinguishability of Lightweight Block Ciphers Across Multiple Modes of Operation. 9 - Chuanming Zong

:
Some Mathematical Problems Behind Lattice-Based Cryptography. 10 - Maya Thabet

, Antonia Tsili
, Konstantinos Krilakis, Dimitris Syvridis
:
Post-Quantum PKI: A Survey of Applications and Benchmarking Practices. 11 - Sang-Yoon Chang

, Qaiser Khan
:
Post-Quantum Cryptography in Networking Protocols: Challenges, Solutions, and Future Directions. 12 - Valli Kumari Vatsavayi, Dinesh Reddy Bommireddy

:
Secure and Efficient Block Cipher Mode Design for Parallel Processing and Reliable Security. 13 - Magdalena Bertram

, Benjamin Zengin
, Nicolas Buchmann
, Marian Margraf
:
Strong Non-Transferability from Randomizable Universal Designated Verifier Signatures. 14
Volume 10, Number 2, 2026
- Mohammad Alkhatib

:
Performance Evaluation of NIST-Standardized Post-Quantum and Symmetric Ciphers for Mitigating Deepfakes. - Sahera A. S. Almola, Hameed A. Younis, Raidah S. Khudeyer:

A Robust Image Encryption Framework Using Deep Feature Extraction and AES Key Optimization. - Tongchen Shen, Xiangxue Li:

A Survey on Classical Lattice Algorithms. - Konstantinos Limniotis

:
Cryptographic Foundations of Pseudonymisation for Personal Data Protection. - Luthando Mletshe, Mnoneleli Nogwina

, Colin Chibaya
:
A Scoping Analysis of the Literature on the Use of Hybrid Cryptographic Systems for Data Hiding in Cloud Storage. - Paul Rochford, William J. Buchanan

, Rich Macfarlane, Madjid G. Tehrani
:
Securely Scaling Autonomy: The Role of Cryptography in Future Unmanned Aircraft Systems (UASs). - Yuqun Lin

, Yi Huang, Xiaomeng Tang, Jingjing Fan
, Qifei Xu, Zoe Lin Jiang
, Xiaosong Zhang, Junbin Fang
:
Homomorphic ReLU with Full-Domain Bootstrapping. - Minghui Zheng, Anqi Xiao, Shicheng Huang

, Deju Kong:
A Searchable Encryption Scheme Based on CRYSTALS-Dilithium. - Zhen Li, Kexin Qiang, Yiming Yang, Zongyue Wang, An Wang:

Moving-Skewness Preprocessing for Simple Power Analysis on Cryptosystems: Revealing Asymmetry in Leakage. - Dusan Catloch

, Peter Pekarcík
, Eva Chovancová
:
Adapting the BIKE Key Encapsulation Mechanism to Memory-Constrained IoT Devices. - Antonio Francesco Gentile

, Maria Cilione:
Chaos Theory with AI Analysis in IoT Network Scenarios. - Alessandro Caniglia

, Felice Franchini
, Stefano Galantucci
, Giuseppe Pirlo
, Gianfranco Semeraro
:
A Multiple User Cryptography Approach Using a One-Time User Key Model and a (1, n) Threshold Polynomial Secret Sharing. - Maksim Iavich

, Tamari Kuchukhidze
, Razvan Bocu
:
Polynomial Commitment Schemes from Classical Constructions to Post-Quantum Directions.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














