Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
 
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
 
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
by Keerthi Nelaturu, Han Du and Duc-Phong Le
 
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
 
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
by Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan and Muttukrishnan Rajarajan
 
Designing a Practical Code-Based Signature Scheme from Zero-Knowledge Proofs with Trusted Setup
by Shay Gueron, Edoardo Persichetti and Paolo Santini
 
Light Weight Authentication Scheme for Smart Home IoT Devices
by Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
 
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review
by Abdulbast A. Abushgra
 
BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models
by Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp and Murat Kuzlu
 
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
by Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
 
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments
by Marius Iulian Mihailescu and Stefania Loredana Nita
Views Article
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
by Keerthi Nelaturu, Han Du and Duc-Phong Le
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
Attacking Windows Hello for Business: Is It What We Were Promised?
by Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden and William J. Buchanan
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
by Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan and Muttukrishnan Rajarajan
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
by Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares and Ivo Pereira
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
by Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
Downloads Article
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
by Keerthi Nelaturu, Han Du and Duc-Phong Le
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices
by Haogang Feng, Gaoze Mu, Shida Zhong, Peichang Zhang and Tao Yuan
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions
by Chithralekha Balamurugan, Kalpana Singh, Ganeshvani Ganesan and Muttukrishnan Rajarajan
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity
by Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng and Kouichi Sakurai
Post Quantum Design in SPDM for Device Authentication and Key Establishment
by Jiewen Yao, Krystian Matusiewicz and Vincent Zimmer
ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3
by Ronaldo Serrano, Ckristian Duran, Marco Sarmiento, Cong-Kha Pham and Trong-Thuc Hoang
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review
by Abdulbast A. Abushgra
Light Weight Authentication Scheme for Smart Home IoT Devices
by Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad and Abdul Razaque
Symmetric Cryptography on RISC-V: Performance Evaluation of Standardized Algorithms
by Görkem Nişancı, Paul G. Flikkema and Tolga Yalçın
Back to TopTop