Skip to Content

Cryptography, Volume 2, Issue 1

2018 March - 6 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (6)

  • Article
  • Open Access
35 Citations
20,126 Views
16 Pages

Can Ternary Computing Improve Information Assurance?

  • Bertrand Cambou,
  • Paul G. Flikkema,
  • James Palmer,
  • Donald Telesca and
  • Christopher Philabaum

Modern computer microarchitectures build on well-established foundations that have encouraged a pattern of computational homogeneity that many cyberattacks depend on. We suggest that balanced ternary logic can be valuable to Internet of Things (IoT)...

  • Article
  • Open Access
14 Citations
13,906 Views
20 Pages

The threat of quantum-computer-assisted cryptanalysis is forcing the security community to develop new types of security protocols. These solutions must be secure against classical and post-quantum cryptanalysis techniques as well as feasible for all...

  • Article
  • Open Access
8 Citations
10,327 Views
19 Pages

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS

  • Iftekhar Salam,
  • Leonie Simpson,
  • Harry Bartlett,
  • Ed Dawson and
  • Kenneth Koon-Ho Wong

This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach t...

  • Technical Note
  • Open Access
3 Citations
15,729 Views
12 Pages

On the Cryptographic Features of a VoIP Service

  • Dimitrios Alvanos,
  • Konstantinos Limniotis and
  • Stavros Stavrou

Security issues of typical Voice over Internet Protocol (VoIP) applications are studied in this paper; in particular, the open source Linphone application is being used as a case study. An experimental analysis indicates that protecting signalling da...

  • Article
  • Open Access
342 Citations
63,539 Views
31 Pages

Multi-Factor Authentication: A Survey

  • Aleksandr Ometov,
  • Sergey Bezzateev,
  • Niko Mäkitalo,
  • Sergey Andreev,
  • Tommi Mikkonen and
  • Yevgeni Koucheryavy

Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communic...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X