You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 2, Issue 4

December 2018 - 16 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (16)

  • Article
  • Open Access
1 Citations
7,718 Views
25 Pages

In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse r...

  • Article
  • Open Access
6,964 Views
16 Pages

Security Incident Information Exchange for Cloud Service Provisioning Chains

  • Christian Frøystad,
  • Inger Anne Tøndel and
  • Martin Gilje Jaatun

Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with end-user customers need information from other providers about incidents that occur at ups...

  • Article
  • Open Access
6,562 Views
12 Pages

Redundancy in Key Management for WSNs

  • Filippo Gandino,
  • Bartolomeo Montrucchio and
  • Maurizio Rebaudengo

Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total num...

  • Article
  • Open Access
22 Citations
12,495 Views
22 Pages

Security and Cryptographic Challenges for Authentication Based on Biometrics Data

  • Stefania Loredana Nita,
  • Marius Iulian Mihailescu and
  • Valentin Corneliu Pau

Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of the society, e.g., Smart City, Internet-of-Things (IoT), Cloud Computing, Big Data. In the near future, biometrics syst...

  • Article
  • Open Access
14 Citations
9,236 Views
20 Pages

Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability&mdas...

  • Article
  • Open Access
1 Citations
6,860 Views
22 Pages

A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online encryption and decryption functionalities...

  • Article
  • Open Access
2 Citations
6,554 Views
15 Pages

In this paper, we gave an attack on RSA (Rivest–Shamir–Adleman) Cryptosystem when φ ( N ) has small multiplicative inverse modulo e and the prime sum p + q is of the form p + q = 2 n k 0 + k 1 , where n is...

  • Article
  • Open Access
9 Citations
6,892 Views
22 Pages

We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic votin...

  • Article
  • Open Access
34 Citations
10,990 Views
12 Pages

The LoRaWAN is one of the new low-power wide-area network (LPWAN) standards applied to Internet of Things (IoT) technology. The key features of LPWAN are its low power consumption and long-range coverage. The LoRaWAN 1.1 specification includes a basi...

  • Article
  • Open Access
5 Citations
9,009 Views
35 Pages

An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public keys. However, how to dynamically revoke users in an IBE scheme is not a trivial problem. To solve this problem, IBE scheme with revocation (name...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387XCreative Common CC BY license