You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 5, Issue 4

December 2021 - 13 articles

Cover Story: As the demand for wearables and fitness trackers is rising, serious concerns over data privacy and security issues are coming into the spotlight. Individual users’ sensitive information, such as heart rate, calories burned, or even sleep patterns, is casually tracked by smart wearable devices to be further processed or exchanged, utilizing the ubiquitous capabilities of the Internet of Things (IoT). The General Data Protection Regulation (GDPR) covers the most important digital privacy issues, including the privacy challenges of wearable devices. Thus, this work aims to analyze data transmitted by different fitness tracking applications, considering their compliance to the GDPR legal framework, as well as to list and evaluate them according to the potential risks and vulnerabilities as stated in the literature. View this paper 
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Review
  • Open Access
54 Citations
14,202 Views
30 Pages

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

  • Chithralekha Balamurugan,
  • Kalpana Singh,
  • Ganeshvani Ganesan and
  • Muttukrishnan Rajarajan

Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on mo...

  • Article
  • Open Access
20 Citations
6,724 Views
20 Pages

A New Hybrid Automated Security Framework to Cloud Storage System

  • Noha E. El-Attar,
  • Doaa S. El-Morshedy and
  • Wael A. Awad

The need for cloud storage grows day after day due to its reliable and scalable nature. The storage and maintenance of user data at a remote location are severe issues due to the difficulty of ensuring data privacy and confidentiality. Some security...

  • Article
  • Open Access
4 Citations
3,724 Views
29 Pages

The design and implementation of two-factor schemes designed for roaming mobile users for global mobility networks in smart cities requires attention to protect the scheme from various security attacks, such as the replay attack, impersonation attack...

  • Article
  • Open Access
10 Citations
8,304 Views
45 Pages

In the last four years, the evolution and adoption of blockchain and, more generally, distributed ledger systems have shown the affirmation of many concepts and models with significant differences in system governance and suitable applications. This...

  • Review
  • Open Access
12 Citations
10,113 Views
33 Pages

Cryptography is traditionally considered as a main information security mechanism, providing several security services such as confidentiality, as well as data and entity authentication. This aspect is clearly relevant to the fundamental human right...

  • Article
  • Open Access
7 Citations
4,152 Views
18 Pages

The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers were proposed for the McEliece cryptosystem, together with the one-Mannh...

  • Article
  • Open Access
4,175 Views
29 Pages

Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies

  • Emad Hamadaqa,
  • Saleh Mulhem,
  • Wael Adi and
  • Mladen Berekovic

Internet of things (IoT) technologies have recently gained much interest from numerous industries, where devices, machines, sensors, or simply things are linked with each other over open communication networks. However, such an operation environment...

  • Article
  • Open Access
6 Citations
4,956 Views
24 Pages

Improvements on Making BKW Practical for Solving LWE

  • Alessandro Budroni,
  • Qian Guo,
  • Thomas Johansson,
  • Erik Mårtensson and
  • Paul Stankovski Wagner

The learning with errors (LWE) problem is one of the main mathematical foundations of post-quantum cryptography. One of the main groups of algorithms for solving LWE is the Blum–Kalai–Wasserman (BKW) algorithm. This paper presents new improvements of...

  • Article
  • Open Access
9 Citations
7,807 Views
20 Pages

This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal of the models is to predict the secret key of a cipher using DL techniques. We investigate the DL techniques against different ciphers, namely, Simplif...

  • Article
  • Open Access
42 Citations
13,799 Views
19 Pages

Individual users’ sensitive information, such as heart rate, calories burned, or even sleep patterns, are casually tracked by smart wearable devices to be further processed or exchanged, utilizing the ubiquitous capabilities of Internet of Things (Io...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X