1
Table of Contents:
“...Coding Theory -- Symmetric Cryptography: Constructions and Attacks -- Zero-Knowledge Protocols -- Digital Signature Schemes and Extensions -- Advances in Post-Quantum Cryptography -- Cryptography in practice: Analyses and Constructions....”
Full text
Full text
2
3
Goel, Sanjay
2024
Table of Contents:
“...Password, Authentication and Cryptography -- A Quantum Physics approach for enabling Informationtheoretic Secure Communication Channels -- Learning framework for guessing alphanumeric passwords on mobile phones based on user context and fragment...”2024
Full text
4
Ge, Chunpeng
2024
Table of Contents:
“... Scheme with Blockchain on non-IID Data -- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation -- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources -- Geometry-based Garbled...”2024
Full text
5
6
Fritsch, Lothar
2024
Table of Contents:
“...Privacy and data protection -- Cryptography, protocols, analysis -- Cyber security -- Aspects of trust -- Defenses and forensics -- Machine learning and artificial intelligence in information security....”2024
Full text
7
Abou el Kalam, Anas
2024
Table of Contents:
“... of Alzheimer's Disease using Deep Learning: A Comprehensive Analysis -- Pattern Recognition in Blockchain, IOT, Cyber Plus Network Security, and Cryptography -- VAIDS: A Hybrid Deep Learning Model to Detect Intrusions in MQTT Protocol Enabled Networks -- Crypto Bank...”2024
Full text
8
9
10
Gupta, Nishu
2024
Table of Contents:
“... Dictionary -- Creating a Protected Virtual Learning Space: A Comprehensive Strategy for Security and User Experience in Online Education -- LIGHTWEIGHT CRYPTOGRAPHY MODEL FOR OVERHEAD AND DELAY REDUCTION IN THE NETWORK -- Modelling the Data Object Routing in Data...”2024
Full text
11
Ge, Chunpeng
2024
Table of Contents:
“... Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers...”2024
Full text
12
13
14
15
16
17
Kim, Howon
2024
Table of Contents:
“...Cryptography -- A New Higher Order Differential of LCB -- Bloomier filters on 3-hypergraphs -- Principal Component Analysis over the Boolean Circuit within TFHE Scheme -- A security analysis on MQ-Sign -- Network and Application Security -- Research...”2024
Full text
18
19
Aziz, Ahmed
2023
Table of Contents:
“... as the money of the future -- A Data Security Technique Combining Asymmetric Cryptography and Compressive Sensing for IoT Enabled Wireless Sensor Networks -- Energy Efficient and Secure Scheme based Compressive Sensing method for Internet of Vehicles -- Impact...”2023
Full text
20