1
2
Goel, Sanjay
2024
Table of Contents:
“...Password, Authentication and Cryptography -- A Quantum Physics approach for enabling Informationtheoretic Secure Communication Channels -- Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment...”2024
Full text
3
Table of Contents:
“...Coding Theory -- Symmetric Cryptography: Constructions and Attacks -- Zero-Knowledge Protocols -- Digital Signature Schemes and Extensions -- Advances in Post-Quantum Cryptography -- Cryptography in practice: Analyses and Constructions....”
Full text
Full text
4
Mazumdar, Bodhisatwa
2024
Table of Contents:
“... Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation -- High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA -- On the Masking-Friendly Designs for Post-Quantum Cryptography -- Spliced Region Detection...”2024
Full text
5
6
7
Kim, Howon
2024
Table of Contents:
“...Cryptography -- A New Higher Order Differential of LCB -- Bloomier filters on 3-hypergraphs -- Principal Component Analysis over the Boolean Circuit within TFHE Scheme -- A security analysis on MQ-Sign -- Network and Application Security -- Research...”2024
Full text
8
9
10
11
12
13
Carlet, Claude
2024
Table of Contents:
“... -- Symmetric cryptography and fault attacks -- The Random Fault Model -- Probabilistic Related-Key Statistical Saturation Cryptanalysis -- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher -- Post-Quantum Analysis...”2024
Full text
14
15
Ge, Chunpeng
2024
Table of Contents:
“... Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers...”2024
Full text
16
Ge, Chunpeng
2024
Table of Contents:
“... Scheme with Blockchain on non-IID Data -- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation -- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources -- Geometry-based Garbled...”2024
Full text
17
18
19
20