You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 1, Issue 1

June 2017 - 9 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (9)

  • Article
  • Open Access
25 Citations
15,587 Views
25 Pages

Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, various recent ECC-based authentication and key exchange protocols are subjected to threat modeling and static analysis to detect vul...

  • Feature Paper
  • Article
  • Open Access
24 Citations
11,733 Views
19 Pages

Analysis of Entropy in a Hardware-Embedded Delay PUF

  • Wenjie Che,
  • Venkata K. Kajuluri,
  • Mitchell Martin,
  • Fareena Saqib and
  • Jim Plusquellic

The magnitude of the information content associated with a particular implementation of a Physical Unclonable Function (PUF) is critically important for security and trust in emerging Internet of Things (IoT) applications. Authentication, in particul...

  • Article
  • Open Access
10 Citations
9,187 Views
5 Pages

We estimate the maximum-order complexity of a binary sequence in terms of its correlation measures. Roughly speaking, we show that any sequence with small correlation measure up to a sufficiently large order k cannot have very small maximum-order com...

  • Book Review
  • Open Access
8,369 Views
3 Pages

The book entitled Privacy in a Digital, Networked World: Technologies, Implications and Solutions of the series Computer Communications and Networks is the latest published book edited by Sherali Zeadally and Mohamad Badra.[...]

  • Review
  • Open Access
45 Citations
15,537 Views
18 Pages

Wireless multimedia sensor networks will play a central role in the Internet of Things world, providing content-rich information for an uncountable number of monitoring and control scenarios. As more applications rely on multimedia data, security con...

  • Article
  • Open Access
53 Citations
12,897 Views
17 Pages

A Privacy-Preserving, Mutual PUF-Based Authentication Protocol

  • Wenjie Che,
  • Mitchell Martin,
  • Goutham Pocklassery,
  • Venkata K. Kajuluri,
  • Fareena Saqib and
  • Jim Plusquellic

This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within a hardware implementation of a cryptographic primitive, s...

  • Article
  • Open Access
3 Citations
9,997 Views
17 Pages

Balanced Permutations Even–Mansour Ciphers

  • Shoni Gilboa,
  • Shay Gueron and
  • Mridul Nandi

The r-rounds Even–Mansour block cipher is a generalization of the well known Even–Mansour block cipher to r iterations. Attacks on this construction were described by Nikolić et al. and Dinur et al. for r = 2 , 3 . These attacks are only margi...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X