Cryptography

Title Publication Date Language Citations
Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives2019/01/02English158
Multi-Factor Authentication: A Survey2018/01/05English101
QUARC: Quantum Research Cubesat—A Constellation for Quantum Communication2020/02/27English34
Provably Secure Covert Communication on Blockchain2018/08/20English34
Power Side-Channel Attack Analysis: A Review of 20 Years of Study for the Layman2020/05/19English32
Beyond Bitcoin: A Critical Look at Blockchain-Based Systems2017/09/01English29
A Privacy-Preserving, Mutual PUF-Based Authentication Protocol2016/11/25English26
A Taxonomy of Blockchain Consensus Methods2020/11/19English25
Multiparty Delegated Quantum Computing2017/07/30English24
A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes2019/01/16English24
An Enhanced Key Management Scheme for LoRaWAN2018/11/02English24
Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions2017/01/05English18
A Simple Protocol for Certifying Graph States and Applications in Quantum Networks2020/01/22English18
Benchmark Analysis of YOLO Performance on Edge Intelligence Devices2022/04/01English17
Efficient One-Time Signatures from Quasi-Cyclic Codes: A Full Treatment2018/10/12English15
A Novel Ultra-Compact FPGA PUF: The DD-PUF2021/09/08English14
Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?2021/03/01English14
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise2017/12/09English13
Privacy Protection in Real Time HEVC Standard Using Chaotic System2020/06/24English13
Pairing Free Identity-Based Blind Signature Scheme with Message Recovery2018/10/09English13
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments2022/02/14English12
Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review2022/03/04English12
On General Data Protection Regulation Vulnerabilities and Privacy Issues, for Wearable Devices and Fitness Tracking Applications2021/10/18English12
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions2022/04/19English11
Cryptanalysis and Improvement of ECC Based Authentication and Key Exchanging Protocols2017/06/13English11
Security Analysis of Lightweight IoT Cipher: Chaskey2020/08/05English11
Analysis of Entropy in a Hardware-Embedded Delay PUF2017/06/07English10
Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM2019/01/10English10
Light Weight Authentication Scheme for Smart Home IoT Devices2022/07/20English9
Synchronization in Quantum Key Distribution Systems2017/10/31English9