Quantum and Lattice-Based Hybrid Cryptosystem for Secure Wireless Body Sensor Networks in Medical Applications Abeer RaadMaryam Ayad GabbarMusaddak Maher Abdul Zahra in SN Computer Science Article 08 November 2025
Post-quantum secure authentication protocol based on OTP and TEE Mamadou Cherif KasseEl Hadj Modou Mboup in The Journal of Supercomputing Article 07 November 2025
HCCIE: hexaflake fractals, chaotic maps, and cellular automata based image encryption technique for IoT Ravinder KumarUmashankar RawatDhruv Pradeep Chhajed in Discover Internet of Things Article Open access 07 November 2025
Implementations of FAST and AEZ on field programmable gate arrays for low level encryption of disks with 4096-byte sectors Debrup ChakrabortySebati GhoshPalash Sarkar in Journal of Cryptographic Engineering Article 06 November 2025
Enforcing Fundamental Relations via Adversarial Attacks on Input Parameter Correlations Lucie FlekPhilipp Alexander JungChristopher Wiebusch in Computing and Software for Big Science Article Open access 05 November 2025
An integrated technique for securing large virtual machine migration Shiladitya BhattacharjeeTanupriya ChoudhuryKetan Kotecha in Computing Article 05 November 2025
Financial Cryptography and Data Security Christina GarmanPedro Moreno-Sanchez in Lecture Notes in Computer Science Conference proceedings 2025
Financial Cryptography and Data Security. FC 2025 International Workshops Bernhard HaslhoferJava XuKarola Marky in Lecture Notes in Computer Science Conference proceedings 2025
Financial Cryptography and Data Security. FC 2025 International Workshops Bernhard HaslhoferJava XuKarola Marky in Lecture Notes in Computer Science Conference proceedings 2025
Quantum cryptanalysis on Feistel variants in related-key settings Xiaoyu WangSiwei ChenXiangyong Zeng in Quantum Information Processing Article 05 November 2025
Enhanced image encryption utilizing DNA encoding and hyperchaotic permutation for robust security M. NaimA. Hadj Brahim in Journal of Optics Article 05 November 2025
Public-Coin Three-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash Susumu Kiyoshima in Journal of Cryptology Article 05 November 2025
Efficient Algorithms for the Detection of (N, N)-Splittings and Endomorphisms Maria Corte-Real SantosCraig CostelloSam Frengley in Journal of Cryptology Article 04 November 2025
Generalized triangle group based S-box construction for secure image encryption Aqsa Zafar AbbasiAyesha RafiqBadr M. Alshammari in Scientific Reports Article Open access 04 November 2025
Detection and localization of deceptive nodes in underwater wireless sensor networks using secure routing R. Sambath KumarG. Sivaradje in Discover Computing Article Open access 04 November 2025
Non-regular thumbnail-preserving encryption based on cross-coupled chaotic model Junbo LiLingfeng LiuRongqing Lei in Journal of King Saud University Computer and Information Sciences Article Open access 03 November 2025
An enhanced hybrid chaotic system and its application in image encryption Junxia GaoYulin ShenJilong Zhang in Journal of King Saud University Computer and Information Sciences Article Open access 03 November 2025
Block-level masking and feature importance-based adversarial example generation Wenbo QiuYafei Song in Journal of Big Data Article Open access 03 November 2025
Mitigating security flaws in Baptista’s chaotic cryptosystem through superior and alternated logistic map approaches Deepak Kumar VermaMamta RaniAnuj Kumar in Scientific Reports Article Open access 03 November 2025
Journal Journal of Cryptology Journal of Cryptologyprovides a forum for original results in all areas of modern information security. Both cryptography and cryptanalysis are... Publishing model Hybrid Journal Impact Factor 2.2 (2024) Downloads 315,133 (2024)
Journal Multimedia Tools and Applications Multimedia Tools and Applicationspublishes original research articles on multimedia development and system support tools, and case studies of... Publishing model Hybrid Downloads 4,110,453 (2024) Submission to first decision(median) 66 days
Journal Journal of Cryptographic Engineering The Journal of Cryptographic Engineering (JCEN) presents high-quality scientific research on architectures, algorithms, techniques, tools,... Publishing model Hybrid Journal Impact Factor 1.4 (2024) Downloads 64,073 (2024) Submission to first decision(median) 2 days