You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 4, Issue 2

June 2020 - 8 articles

Cover Story: In this work, we propose a novel PUF design that leverages board variations in a manufactured printed circuit board (PCB) to generate unique and stable IDs for each PCB. A single copper trace is used as a source of randomness for bitstring generation. The trace connects three notch filter structures in series, each of which is designed to reject specific but separate frequencies. The bitstrings generated using data measured from a set of PCBs are analyzed using statistical tests to illustrate that high levels of uniqueness and randomness are achievable. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (8)

  • Article
  • Open Access
20 Citations
6,026 Views
21 Pages

Privacy Protection in Real Time HEVC Standard Using Chaotic System

  • Mohammed Abu Taha,
  • Wassim Hamidouche,
  • Naty Sidaty,
  • Marko Viitanen,
  • Jarno Vanne,
  • Safwan El Assad and
  • Olivier Deforges

Video protection and access control have gathered steam over recent years. However, the most common methods encrypt the whole video bit stream as unique data without taking into account the structure of the compressed video. These full encryption sol...

  • Article
  • Open Access
34 Citations
6,946 Views
26 Pages

Securing Additive Manufacturing with Blockchains and Distributed Physically Unclonable Functions

  • Bertrand Cambou,
  • Michael Gowanlock,
  • Julie Heynssens,
  • Saloni Jain,
  • Christopher Philabaum,
  • Duane Booher,
  • Ian Burke,
  • Jack Garrard,
  • Donald Telesca and
  • Laurent Njilla

Blockchain technology is a game-changing, enhancing security for the supply chain of smart additive manufacturing. Blockchain enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered...

  • Article
  • Open Access
8 Citations
8,541 Views
31 Pages

Single sign-on (SSO) techniques allow access control for multiple systems with a single login. The aim of our study is to construct an authentication algorithm that provides the authentication information of a user to a requester without requiring an...

  • Review
  • Open Access
143 Citations
26,066 Views
33 Pages

Physical cryptographic implementations are vulnerable to so-called side-channel attacks, in which sensitive information can be recovered by analyzing physical phenomena of a device during operation. In this survey, we trace the development of power s...

  • Article
  • Open Access
3 Citations
5,337 Views
12 Pages

As RFID technology is being widely used in access control systems to identify and track both objects and people, relay attacks on RFID systems continue to pose serious threats to security. To mitigate relay attacks, distance bounding protocols can be...

  • Article
  • Open Access
11 Citations
7,321 Views
20 Pages

Side-Channel Power Resistance for Encryption Algorithms Using Implementation Diversity

  • Ivan Bow,
  • Nahome Bete,
  • Fareena Saqib,
  • Wenjie Che,
  • Chintan Patel,
  • Ryan Robucci,
  • Calvin Chan and
  • Jim Plusquellic

This paper investigates countermeasures to side-channel attacks. A dynamic partial reconfiguration (DPR) method is proposed for field programmable gate arrays (FPGAs)s to make techniques such as differential power analysis (DPA) and correlation power...

  • Case Report
  • Open Access
7 Citations
5,285 Views
14 Pages

This paper proposes a portable hardware token for user’s authentication; it is based on the use of keystroke dynamics to verify users biometrically. The proposed approach allows for a multifactor authentication scheme, in which a user cannot be...

  • Article
  • Open Access
8 Citations
6,216 Views
20 Pages

Physical Unclonable Functions (PUFs) are primitives that are designed to leverage naturally occurring variations to produce a random bitstring. Current PUF designs are typically implemented in silicon or utilize variations found in commercial off-the...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X