Need Help?
Most Cited & Viewed
Most Cited & Viewed Papers
Citations | Article |
---|---|
One-to-Many Simultaneous Secure Quantum Information Transmission
by
Theodore Andronikos and Alla Sirokofskich
|
|
Random Number Generators: Principles and Applications
by
Anastasios Bikos, Panagiotis E. Nastou, Georgios Petroudis and Yannis C. Stamatiou
|
|
Comparative Study of Keccak SHA-3 Implementations
by
Alessandra Dolmeta, Maurizio Martina and Guido Masera
|
|
On the Security of Quantum Key Distribution Networks
by
Eufemia Lella and Giovanni Schmid
|
|
Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V
by
Geraldine Shirley Nicholas, Dhruvakumar Vikas Aklekar, Bhavin Thakar and Fareena Saqib
|
|
A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework
by
Ivar Walskaar, Minh Christian Tran and Ferhat Ozgur Catak
|
Citations | Article |
---|---|
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives
by
Asad Ali Siyal, Aisha Zahid Junejo, Muhammad Zawish, Kainat Ahmed, Aiman Khalil and Georgia Soursou
|
|
Multi-Factor Authentication: A Survey
by
Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen and Yevgeni Koucheryavy
|
|
Provably Secure Covert Communication on Blockchain
by
Juha Partala
|
|
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
by
Mark Randolph and William Diehl
|
|
QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication
by
Luca Mazzarella, Christopher Lowe, David Lowndes, Siddarth Koduru Joshi, Steve Greenland, Doug McNeil, Cassandra Mercury, Malcolm Macdonald, John Rarity and Daniel Kuan Li Oi
|
|
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems
by
Diego Romano and Giovanni Schmid
|
|
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol
by
Wenjie Che, Mitchell Martin, Goutham Pocklassery, Venkata K. Kajuluri, Fareena Saqib and Jim Plusquellic
|
|
Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions
by
Daniel G. Costa, Solenir Figuerêdo and Gledson Oliveira
|
|
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by
Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
|
|
Multiparty Delegated Quantum Computing
by
Elham Kashefi and Anna Pappa
|
Views | Article |
---|---|
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
by
Keerthi Nelaturu, Han Du and Duc-Phong Le
|
|
Attacking Windows Hello for Business: Is It What We Were Promised?
by
Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden and William J. Buchanan
|
|
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by
Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
|
|
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by
Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
|
|
A Survey of Post-Quantum Cryptography: Start of a New Race
by
Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
|
|
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by
Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
|
|
Applications of Neural Network-Based AI in Cryptography
by
Abderrahmane Nitaj and Tajjeeddine Rachidi
|
|
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
by
Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp and Murat Kuzlu
|
|
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations
by
Vyron Kampourakis, Efstratios Chatzoglou, Georgios Kambourakis, Apostolos Dolmes and Christos Zaroliagis
|
|
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare
by
Kyriaki Tsantikidou and Nicolas Sklavos
|
Views | Article |
---|---|
A Survey of Post-Quantum Cryptography: Start of a New Race
by
Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
|
|
Applications of Neural Network-Based AI in Cryptography
by
Abderrahmane Nitaj and Tajjeeddine Rachidi
|
|
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
by
Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares and Ivo Pereira
|
|
The Role of Blockchain in Medical Data Sharing
by
Hamed Taherdoost
|
|
Random Number Generators: Principles and Applications
by
Anastasios Bikos, Panagiotis E. Nastou, Georgios Petroudis and Yannis C. Stamatiou
|
|
Secure Firmware Update: Challenges and Solutions
by
Luigi Catuogno and Clemente Galdi
|
|
Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications
by
Luis Parrilla, Antonio García, Encarnación Castillo, Juan Antonio López-Villanueva and Uwe Meyer-Baese
|
|
Comparative Study of Keccak SHA-3 Implementations
by
Alessandra Dolmeta, Maurizio Martina and Guido Masera
|
|
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
by
Kusum Lata and Linga Reddy Cenkeramaddi
|
Views | Article |
---|---|
Multi-Factor Authentication: A Survey
by
Aleksandr Ometov, Sergey Bezzateev, Niko Mäkitalo, Sergey Andreev, Tommi Mikkonen and Yevgeni Koucheryavy
|
|
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives
by
Asad Ali Siyal, Aisha Zahid Junejo, Muhammad Zawish, Kainat Ahmed, Aiman Khalil and Georgia Soursou
|
|
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems
by
Diego Romano and Giovanni Schmid
|
|
Password-Hashing Status
by
George Hatzivasilis
|
|
Can Ternary Computing Improve Information Assurance?
by
Bertrand Cambou, Paul G. Flikkema, James Palmer, Donald Telesca and Christopher Philabaum
|
|
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman
by
Mark Randolph and William Diehl
|
|
Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions
by
Daniel G. Costa, Solenir Figuerêdo and Gledson Oliveira
|
|
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise
by
Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas and Marten Van Dijk
|
|
Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols
by
Swapnoneel Roy and Chanchal Khatwani
|
|
An Overview of DRAM-Based Security Primitives
by
Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser, John Chandy and Fatemeh Tehranipoor
|