Skip to Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 2, Issue 3

2018 September - 15 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (15)

  • Article
  • Open Access
16 Citations
9,406 Views
32 Pages

Comparison of Cost of Protection against Differential Power Analysis of Selected Authenticated Ciphers

  • William Diehl,
  • Abubakr Abdulgadir,
  • Farnoud Farahmand,
  • Jens-Peter Kaps and
  • Kris Gaj

Authenticated ciphers, which combine the cryptographic services of confidentiality, integrity, and authentication into one algorithmic construct, can potentially provide improved security and efficiencies in the processing of sensitive data. However,...

  • Article
  • Open Access
9 Citations
9,278 Views
21 Pages

On the Performance and Security of Multiplication in GF(2N)

  • Jean-Luc Danger,
  • Youssef El Housni,
  • Adrien Facon,
  • Cheikh T. Gueye,
  • Sylvain Guilley,
  • Sylvie Herbel,
  • Ousmane Ndiaye,
  • Edoardo Persichetti and
  • Alexander Schaub

Multiplications in G F ( 2 N ) can be securely optimized for cryptographic applications when the integer N is small and does not match machine words (i.e., N < 32 ). In this paper, we present a set of optimizations applied to DAGS...

  • Article
  • Open Access
18 Citations
7,869 Views
11 Pages

A New Visual Multi-Secrets Sharing Scheme by Random Grids

  • Joy Jo-Yi Chang,
  • Bo-Yuan Huang and
  • Justie Su-Tzu Juan

In (2, 2)-visual secret sharing (VSS) schemes, a common type of (k, n)-threshold VSS schemes, secret information can be decoded directly through only two shares by using a human vision system. Several studies have analyzed methods of simplifying the...

  • Article
  • Open Access
2 Citations
7,662 Views
8 Pages

A Secure Algorithm for Inversion Modulo 2k

  • Sadiel De la Fe and
  • Carles Ferrer

Modular inversions are widely employed in public key crypto-systems, and it is known that they imply a bottleneck due to the expensive computation. Recently, a new algorithm for inversions modulo p k was proposed, which may speed up the calcu...

  • Article
  • Open Access
24 Citations
9,245 Views
19 Pages

Barrel Shifter Physical Unclonable Function Based Encryption

  • Yunxi Guo,
  • Timothy Dee and
  • Akhilesh Tyagi

Physical Unclonable Functions (PUFs) are designed to extract physical randomness from the underlying silicon. This randomness depends on the manufacturing process. It differs for each device. This enables chip-level authentication and key generation...

  • Article
  • Open Access
3 Citations
7,265 Views
17 Pages

Physical unclonable function (PUF)-based authentication protocols have been proposed as a strong challenge-response form of authentication for internet of things (IoT) and embedded applications. A special class of so called strong PUFs are best suite...

  • Feature Paper
  • Article
  • Open Access
7 Citations
9,723 Views
18 Pages

Hardware-Based Run-Time Code Integrity in Embedded Devices

  • Taimour Wehbe,
  • Vincent Mooney and
  • David Keezer

Attacks on embedded devices are becoming more and more prevalent, primarily due to the extensively increasing plethora of software vulnerabilities. One of the most dangerous types of these attacks targets application code at run-time. Techniques to d...

  • Article
  • Open Access
131 Citations
11,847 Views
18 Pages

Blockchain is a public open ledger that provides data integrity in a distributed manner. It is the underlying technology of cryptocurrencies and an increasing number of related applications, such as smart contracts. The open nature of blockchain toge...

  • Article
  • Open Access
18 Citations
9,100 Views
14 Pages

Non-Invasive Detection Method for Recycled Flash Memory Using Timing Characteristics

  • Sadman Sakib,
  • Preeti Kumari,
  • B. M. S. Bahar Talukder,
  • Md Tauhidur Rahman and
  • Biswajit Ray

Counterfeiting electronic components is a serious problem for the security and reliability of any electronic systems. Unfortunately, the number of counterfeit components has increased considerably after the introduction of horizontal semiconductor su...

  • Brief Report
  • Open Access
1 Citations
7,594 Views
6 Pages

Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside Sn

  • María Isabel González Vasco,
  • Angela Robinson and
  • Rainer Steinwandt

In 2008, Doliskani et al. proposed an ElGamal-style encryption scheme using the symmetric group Sn as mathematical platform. In 2012, an improvement of the cryptosystem’s memory requirements was suggested by Othman. The proposal by Doliskani et...

  • Article
  • Open Access
19 Citations
10,193 Views
17 Pages

An Autonomous, Self-Authenticating, and Self-Contained Secure Boot Process for Field-Programmable Gate Arrays

  • Don Owen Jr.,
  • Derek Heeger,
  • Calvin Chan,
  • Wenjie Che,
  • Fareena Saqib,
  • Matt Areno and
  • Jim Plusquellic

Secure booting within a field-programmable gate array (FPGA) environment is traditionally implemented using hardwired embedded cryptographic primitives and non-volatile memory (NVM)-based keys, whereby an encrypted bitstream is decrypted as it is loa...

  • Article
  • Open Access
3 Citations
7,483 Views
15 Pages

Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms ineffic...

  • Article
  • Open Access
13 Citations
11,090 Views
45 Pages

Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security

  • Nikolaos Athanasios Anagnostopoulos,
  • Tolga Arul,
  • Yufan Fan,
  • Christian Hatzfeld,
  • André Schaller,
  • Wenjie Xiong,
  • Manishkumar Jain,
  • Muhammad Umair Saleem,
  • Jan Lotichius and
  • Stefan Katzenbeisser
  • + 2 authors

Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic protocols. However, as recent work has demo...

  • Article
  • Open Access
5 Citations
8,143 Views
21 Pages

Designing Secure Heterogeneous Multicore Systems from Untrusted Components

  • Michel A. Kinsy,
  • Lake Bu,
  • Mihailo Isakov and
  • Miguel Mark

In current systems-on-chip (SoCs) designs, processing elements, i.e., intellectual property (IP) cores, may come from different providers, and executable code may have varying levels of trust, all executing on the same compute platform and sharing re...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X