You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 4, Issue 3

September 2020 - 7 articles

Cover Story: This paper presents a new parameter set for faster commutative supersingular isogeny Diffie–Hellman (CSIDH). A computation of large odd-degree isogenies, the main obstacle of CSIDH, has been settled to some extent by using a two-torsion point. We hope that this work will be helpful for various discussions on optimization for CSIDH. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (7)

  • Article
  • Open Access
13 Citations
5,349 Views
22 Pages

Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the c...

  • Article
  • Open Access
5 Citations
4,643 Views
16 Pages

Chaotic Quantum Key Distribution

  • Noah Cowper,
  • Harry Shaw and
  • David Thayer

The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched. We explored a novel application of quantum key distribution (QKD) and...

  • Article
  • Open Access
2 Citations
5,134 Views
18 Pages

SAEAES is the authenticated encryption algorithm instantiated by combining the SAEB mode of operation with AES, and a candidate of the NIST’s lightweight cryptography competition. Using AES gives the advantage of backward compatibility with the...

  • Article
  • Open Access
20 Citations
6,005 Views
10 Pages

This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree search based heuristic approach. ARX algorithms are suitable for resource-constrained devices such as IoT and very resistant to standard cryptanalysis such as l...

  • Article
  • Open Access
1 Citations
3,592 Views
19 Pages

A new public key agreement (PKA) algorithm, called the strongly-asymmetric algorithm (SAA-5), was introduced by Accardi et al. The main differences from the usual PKA algorithms are that Bob has some independent public keys and Alice produces her pub...

  • Article
  • Open Access
4 Citations
3,993 Views
13 Pages

Optimized CSIDH Implementation Using a 2-Torsion Point

  • Donghoe Heo,
  • Suhri Kim,
  • Kisoon Yoon,
  • Young-Ho Park and
  • Seokhie Hong

The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient w...

  • Article
  • Open Access
2 Citations
5,015 Views
24 Pages

Tamper and Clone-Resistant Authentication Scheme for Medical Image Systems

  • Mayssa Tayachi,
  • Saleh Mulhem,
  • Wael Adi,
  • Laurent Nana,
  • Anca Pascu and
  • Faouzi Benzarti

Telemedicine applications are more and more used due to the rapid development of digital imaging and information and communication technologies. Medical information which include digital medical images and patient’s information are extracted an...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X