Most Cited & Viewed

Most Cited & Viewed Papers

Citations Article
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
 
A Survey of Consortium Blockchain and Its Applications
by Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng and Chase Q. Wu
 
The Role of Blockchain in Medical Data Sharing
by Hamed Taherdoost
 
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
 
A Novel FPGA Implementation of the NAND-PUF with Minimal Resource Usage and High Reliability
by Riccardo Della Sala and Giuseppe Scotti
 
Random Number Generators: Principles and Applications
by Anastasios Bikos, Panagiotis E. Nastou, Georgios Petroudis and Yannis C. Stamatiou
 
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
by Kusum Lata and Linga Reddy Cenkeramaddi
 
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
by Gregory Fitzgibbon and Carlo Ottaviani
 
A High-Efficiency Modular Multiplication Digital Signal Processing for Lattice-Based Post-Quantum Cryptography
by Trong-Hung Nguyen, Cong-Kha Pham and Trong-Thuc Hoang
 
A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework
by Ivar Walskaar, Minh Christian Tran and Ferhat Ozgur Catak
Views Article
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
“Whispers from the Wrist”: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities
by Asma Sifaoui and Matthew S. Eastin
Attacking Windows Hello for Business: Is It What We Were Promised?
by Joseph Haddad, Nikolaos Pitropakis, Christos Chrysoulas, Mouad Lemoudden and William J. Buchanan
Investigating CRYSTALS-Kyber Vulnerabilities: Attack Analysis and Mitigation
by Maksim Iavich and Tamari Kuchukhidze
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
by Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares and Ivo Pereira
A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments
by Maryam Abbasi, Filipe Cardoso, Paulo Váz, José Silva and Pedro Martins
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
by Kusum Lata and Linga Reddy Cenkeramaddi
Random Number Generators: Principles and Applications
by Anastasios Bikos, Panagiotis E. Nastou, Georgios Petroudis and Yannis C. Stamatiou
Comparative Study of Keccak SHA-3 Implementations
by Alessandra Dolmeta, Maurizio Martina and Guido Masera
Downloads Article
A Survey of Post-Quantum Cryptography: Start of a New Race
by Duc-Thuan Dam, Thai-Ha Tran, Van-Phuc Hoang, Cong-Kha Pham and Trong-Thuc Hoang
Applications of Neural Network-Based AI in Cryptography
by Abderrahmane Nitaj and Tajjeeddine Rachidi
FPGA-Based PUF Designs: A Comprehensive Review and Comparative Analysis
by Kusum Lata and Linga Reddy Cenkeramaddi
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
by Kyriaki Tsantikidou and Nicolas Sklavos
Blockchain-Based Electronic Voting: A Secure and Transparent Solution
by Bruno Miguel Batista Pereira, José Manuel Torres, Pedro Miguel Sobral, Rui Silva Moreira, Christophe Pinto de Almeida Soares and Ivo Pereira
A Survey of Consortium Blockchain and Its Applications
by Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng and Chase Q. Wu
A Practical Implementation of Medical Privacy-Preserving Federated Learning Using Multi-Key Homomorphic Encryption and Flower Framework
by Ivar Walskaar, Minh Christian Tran and Ferhat Ozgur Catak
Constrained Device Performance Benchmarking with the Implementation of Post-Quantum Cryptography
by Gregory Fitzgibbon and Carlo Ottaviani
Comparative Study of Keccak SHA-3 Implementations
by Alessandra Dolmeta, Maurizio Martina and Guido Masera
Random Number Generators: Principles and Applications
by Anastasios Bikos, Panagiotis E. Nastou, Georgios Petroudis and Yannis C. Stamatiou
Back to TopTop