You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 5, Issue 1

March 2021 - 11 articles

Cover Story: Classical client remote state preparation is primitive, where a fully classical client can instruct the preparation of random quantum states on a distant server, such that the description is known to the client but remains hidden from the server. This primitive aspect has many applications, most prominently, it makes blind quantum computing possible for classical clients. In this work, we give the first protocol for classical client remote state preparation. The protocol is proven to be secure against honest-but-curious servers and any malicious third party. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (11)

  • Article
  • Open Access
12 Citations
5,203 Views
14 Pages

A New Class of Q-Ary Codes for the McEliece Cryptosystem

  • Jürgen Freudenberger and
  • Johann-Philipp Thiers

The McEliece cryptosystem is a promising candidate for post-quantum public-key encryption. In this work, we propose q-ary codes over Gaussian integers for the McEliece system and a new channel model. With this one Mannheim error channel, errors are l...

  • Article
  • Open Access
5 Citations
5,449 Views
47 Pages

The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration

  • Niluka Amarasinghe,
  • Xavier Boyen and
  • Matthew McKague

The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised by these schemes. Bitcoin, despite being considered as the most widespread among all, is cl...

  • Article
  • Open Access
30 Citations
12,695 Views
18 Pages

Why Is Deep Learning Challenging for Printed Circuit Board (PCB) Component Recognition and How Can We Address It?

  • Mukhil Azhagan Mallaiyan Sathiaseelan,
  • Olivia P. Paradis,
  • Shayan Taheri and
  • Navid Asadizanjani

In this paper, we present the need for specialized artificial intelligence (AI) for counterfeit and defect detection of PCB components. Popular computer vision object detection techniques are not sufficient for such dense, low inter-class/high intra-...

  • Article
  • Open Access
22 Citations
6,097 Views
21 Pages

TRNGs from Pre-Formed ReRAM Arrays

  • Bertrand Cambou,
  • Donald Telesca,
  • Sareh Assiri,
  • Michael Garrett,
  • Saloni Jain and
  • Michael Partridge

Schemes generating cryptographic keys from arrays of pre-formed Resistive Random Access (ReRAM) cells, called memristors, can also be used for the design of fast true random number generators (TRNG’s) of exceptional quality, while consuming low level...

  • Review
  • Open Access
10 Citations
7,627 Views
29 Pages

Flash-Based Security Primitives: Evolution, Challenges and Future Directions

  • Holden Gordon,
  • Jack Edmonds,
  • Soroor Ghandali,
  • Wei Yan,
  • Nima Karimian and
  • Fatemeh Tehranipoor

Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inh...

  • Article
  • Open Access
5 Citations
5,693 Views
18 Pages

Montgomery Reduction for Gaussian Integers

  • Malek Safieh and
  • Jürgen Freudenberger

Modular arithmetic over integers is required for many cryptography systems. Montgomery reduction is an efficient algorithm for the modulo reduction after a multiplication. Typically, Montgomery reduction is used for rings of ordinary integers. In con...

  • Article
  • Open Access
13 Citations
8,060 Views
15 Pages

Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existi...

  • Article
  • Open Access
14 Citations
6,533 Views
50 Pages

On the Possibility of Classical Client Blind Quantum Computing

  • Alexandru Cojocaru,
  • Léo Colisson,
  • Elham Kashefi and
  • Petros Wallden

Classical client remote state preparation (CC − RSP) is a primitive where a fully classical party (client) can instruct the preparation of a sequence of random quantum states on some distant party (server) in a way that the description is known to th...

  • Article
  • Open Access
1 Citations
5,039 Views
28 Pages

Conjunctive queries play a key role in retrieving data from a database. In a database, a query containing many conditions in its predicate, connected by an “and/&/∧” operator, is called a conjunctive query. Retrieving the outcome of a conjunctive...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X