You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 3, Issue 2

June 2019 - 6 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (6)

  • Article
  • Open Access
8 Citations
7,647 Views
19 Pages

I2PA: An Efficient ABC for IoT

  • Ibou Sene,
  • Abdoul Aziz Ciss and
  • Oumar Niang

The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography. Many schemes have been designed so far but none of them simultaneously...

  • Article
  • Open Access
6 Citations
8,052 Views
16 Pages

Modular reduction of large values is a core operation in most common public-key cryptosystems that involves intensive computations in finite fields. Within such schemes, efficiency is a critical issue for the effectiveness of practical implementation...

  • Article
  • Open Access
1 Citations
8,196 Views
23 Pages

Optimized AKS Primality Testing: A Fluctuation Theory Perspective

  • Bhupendra Nath Tiwari,
  • Jude Kibinde Kuipo,
  • Joshua M. Adeegbe and
  • Ninoslav Marina

The AKS algorithm is an important breakthrough in showing that primality testing of an integer can be done in polynomial time. In this paper, we study the optimization of its runtime. Namely, given a finite cardinality set of alphabets of a determini...

  • Article
  • Open Access
9 Citations
8,094 Views
22 Pages

A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs. If one unknown cipher from the KSG-class is randomly picked-up and stored ir...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X