Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
 
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
 
Light Weight Authentication Scheme for Smart Home IoT Devices
by Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
 
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
by Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp and Murat Kuzlu
 
The Role of Blockchain in Medical Data Sharing
by Hamed Taherdoost
 
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
 
Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems
by Vyacheslav Kharchenko, Yuriy Ponochovnyi, Oleg Ivanchenko, Herman Fesenko and Oleg Illiashenko
 
A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability
by Riccardo Della Sala and Giuseppe Scotti
 
Hardware Limitations of Lightweight Cryptographic Designs for IoT in Healthcare
by Kyriaki Tsantikidou and Nicolas Sklavos
 
Connected Blockchain Federations for Sharing Electronic Health Records
by Faiza Hashim, Khaled Shuaib and Farag Sallabi
 
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
Views Article
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
Attacking Windows Hello for Business: Is It What We Were Promised?
by Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden and William J. Buchanan
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
by Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares and Ivo Pereira
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
by Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp and Murat Kuzlu
Random Number Generators: Principles and Applications
by Anastasios Bikos, Panagiotis E. Nastou, Georgios Petroudis and Yannis C. Stamatiou
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
by Kusum Lata and Linga Reddy Cenkeramaddi
The Role of Blockchain in Medical Data Sharing
by Hamed Taherdoost
Downloads Article
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
Light Weight Authentication Scheme for Smart Home IoT Devices
by Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
by Harshana Bandara, Yasitha Herath, Thushara Weerasundara and Janaka Alawatugoda
Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms
by Görkem Nişancı, Paul G. Flikkema and Tolga Yalçın
Review of Chosen Isogeny-Based Cryptographic Schemes
by Bartosz Drzazga and Łukasz Krzywiecki
Attribute-Based Encryption in Securing Big Data from Post-Quantum Perspective: A Survey
by Zulianie Binti Jemihin, Soo Fun Tan and Gwo-Chin Chung
Side-Channel Attacks on Masked Bitsliced Implementations of AES
by Anca Rădulescu and Marios O. Choudary
Back to TopTop