1.
Kundu, A., Das, J. C., De, D., & Debnath, B. (2022). Reversible Vigenere Cryptographic Cipher in Quantum-Dot Cellular Automata. In 2022 IEEE International Conference of Electron Devices Society Kolkata Chapter (EDKCON).
2.
Dorobantu, O. G., Apostol, A. G., & Datcu, O. (2022). The poly-alphabetic substitution ciphers - a viable solution for IoT applications? In 2022 International Symposium on Electronics and Telecommunications (ISETC).
3.
Jassim, S. A., & Farhan, A. K. (2021). A Survey on Stream Ciphers for Constrained Environments. In 2021 1st Babylon International Conference on Information Technology and Science (BICITS).
4.
Iqbal, M., Velasco, L., Costa, N., Napoli, A., Pedro, J., & Ruiz, M. (2022). LPsec: a fast and secure cryptographic system for optical connections. Journal of Optical Communications and Networking, 14(4).
5.
Vignesh, R. S., Chinnammal, V., Gururaj.D, Kishore Kumar, A. T. A., & Karthikeyan, K. V. (2023). Secured Data Access and Control Abilities Management over Cloud Environment using Novel Cryptographic Principles. In 2023 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI).
6.
Windarta, S., Suryadi, S., Ramli, K., Lestari, A. A., Wildan, W., Pranggono, B., & Wardhani, R. W. (2023). Two New Lightweight Cryptographic Hash Functions Based on Saturnin and Beetle for the Internet of Things. IEEE Access, 11.
7.
Hariss, K., & Noura, H. (2022). ACiS: Lightweight and Robust Homomorphic Block Cipher Additive Scheme. In 2022 International Wireless Communications and Mobile Computing (IWCMC).
8.
Datta, B. P. R. V., & Sreehari, K. N. (2023). FPGA Implementation of Different Layers of Present Cipher. In 2023 3rd International Conference on Intelligent Technologies (CONIT).
9.
Baksi, A., Kumar, S., & Sarkar, S. (2022). A New Approach for Side Channel Analysis on Stream Ciphers and Related Constructions. IEEE Transactions on Computers, 71(10).
10.
Liu, Y., He, J., Ma, H., Qu, T., & Dai, Z. (2022). A Comprehensive Evaluation of Integrated Circuits Side-Channel Resilience Utilizing Three-Independent-Gate Silicon Nanowire Field Effect Transistors-Based Current Mode Logic. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(10).
11.
Hussain, S., & Mohideen, P. M. S. (2023). Advanced Machine Learning Approach for Suspicious Coded Message Detection using Enigma Cipher. In 2023 Second International Conference on Electronics and Renewable Systems (ICEARS).
12.
Irodah, R. M., & Adriansyah, A. (2022). Analysis and Design of Self-service Local Water Company (LWC) using Vernam Cipher Cryptography Algorithm. In 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS).
13.
Velasco, L., Iqbal, M., & Ruiz, M. (2023). Secure Optical Communications Based on Fast Cryptography. In 2023 23rd International Conference on Transparent Optical Networks (ICTON).
14.
Parida, D., & Bhanja, U. (2023). Smart Meters: Cyber Security Issues and Their Solutions. In 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN).
15.
Upadhyaya, D., Gay, M., & Polian, I. (2023). LEDA: Locking Enabled Differential Analysis of Cryptographic Circuits. In 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).
16.
Iqbal, M., Ari Laksmono, A. M., Prihatno, A. T., Pratama, D., Jeong, B., & Kim, H. (2023). Enhancing IoT Security: Integrating MQTT with ARIA Cipher 256 Algorithm Cryptography and mbedTLS. In 2023 International Conference on Platform Technology and Service (PlatCon).
17.
Garcia, D., & Liu, H. (2021). A Study of Post Quantum Cipher Suites for Key Exchange. In 2021 IEEE International Symposium on Technologies for Homeland Security (HST).
18.
Salman, R. S., Farhan, A. K., & Shakir, A. (2022). Lightweight Modifications in the Advanced Encryption Standard (AES) for IoT Applications: A Comparative Survey. In 2022 International Conference on Computer Science and Software Engineering (CSASE).
19.
Segala, A. (2022). Essential Cryptography for JavaScript Developers: A practical guide to leveraging common cryptographic operations in Node.js and the browser. Packt Publishing.
20.
Rajashree, S., Vineetha, B., Mehta, A. B., & Honnavalli, P. B. (2022). Homomorphic Encryption Approach for String Concatenation. In 2022 IEEE 4th International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA).
21.
Unger, W., Babinkostova, L., Borowczak, M., & Erbes, R. (2021). Side-channel Leakage Assessment Metrics: A Case Study of GIFT Block Ciphers. In 2021 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
22.
Jassim, S. A., Farhan, A. K., & Radie, A. H. (2021). Using a Hybrid Pseudorandom Number Generator for Cryptography in the Internet of Things. In 2021 4th International Iraqi Conference on Engineering Technology and Their Applications (IICETA).
23.
Dar, M. A., Askar, A., & Bhat, S. A. (2022). Blockchain based Secure Data Exchange between Cloud Networks and Smart Hand-held Devices for use in Smart Cities. In 2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC).
24.
Biesmans, J., Regazzoni, F., & Mentens, N. (2023). Application-specific FPGAs: cryptographic agility through customized reconfigurable architectures. In 2023 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).
25.
Umamaheswari, S., Vishal, N. R., Pragadesh, N. R., & Lavanya, S. (2023). Secure Data Transmission using Hybrid Crypto Processor based on AES and HMAC Algorithms. In 2023 2nd International Conference on Advancements in Electrical, Electronics, Communication and Automation (ICAECA).