Skip to Content

Cryptography, Volume 5, Issue 4

2021 December - 13 articles

Cover Story: As the demand for wearables and fitness trackers is rising, serious concerns over data privacy and security issues are coming into the spotlight. Individual users’ sensitive information, such as heart rate, calories burned, or even sleep patterns, is casually tracked by smart wearable devices to be further processed or exchanged, utilizing the ubiquitous capabilities of the Internet of Things (IoT). The General Data Protection Regulation (GDPR) covers the most important digital privacy issues, including the privacy challenges of wearable devices. Thus, this work aims to analyze data transmitted by different fitness tracking applications, considering their compliance to the GDPR legal framework, as well as to list and evaluate them according to the potential risks and vulnerabilities as stated in the literature. View this paper 
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (13)

  • Review
  • Open Access
58 Citations
14,694 Views
30 Pages

Post-Quantum and Code-Based Cryptography—Some Prospective Research Directions

  • Chithralekha Balamurugan,
  • Kalpana Singh,
  • Ganeshvani Ganesan and
  • Muttukrishnan Rajarajan

Cryptography has been used from time immemorial for preserving the confidentiality of data/information in storage or transit. Thus, cryptography research has also been evolving from the classical Caesar cipher to the modern cryptosystems, based on mo...

  • Article
  • Open Access
22 Citations
6,985 Views
20 Pages

A New Hybrid Automated Security Framework to Cloud Storage System

  • Noha E. El-Attar,
  • Doaa S. El-Morshedy and
  • Wael A. Awad

The need for cloud storage grows day after day due to its reliable and scalable nature. The storage and maintenance of user data at a remote location are severe issues due to the difficulty of ensuring data privacy and confidentiality. Some security...

  • Article
  • Open Access
4 Citations
3,822 Views
29 Pages

The design and implementation of two-factor schemes designed for roaming mobile users for global mobility networks in smart cities requires attention to protect the scheme from various security attacks, such as the replay attack, impersonation attack...

  • Article
  • Open Access
11 Citations
8,692 Views
45 Pages

In the last four years, the evolution and adoption of blockchain and, more generally, distributed ledger systems have shown the affirmation of many concepts and models with significant differences in system governance and suitable applications. This...

  • Review
  • Open Access
13 Citations
10,482 Views
33 Pages

Cryptography is traditionally considered as a main information security mechanism, providing several security services such as confidentiality, as well as data and entity authentication. This aspect is clearly relevant to the fundamental human right...

  • Article
  • Open Access
8 Citations
4,335 Views
18 Pages

The code-based McEliece and Niederreiter cryptosystems are promising candidates for post-quantum public-key encryption. Recently, q-ary concatenated codes over Gaussian integers were proposed for the McEliece cryptosystem, together with the one-Mannh...

  • Article
  • Open Access
4,288 Views
29 Pages

Contemporary Physical Clone-Resistant Identity for IoTs and Emerging Technologies

  • Emad Hamadaqa,
  • Saleh Mulhem,
  • Wael Adi and
  • Mladen Berekovic

Internet of things (IoT) technologies have recently gained much interest from numerous industries, where devices, machines, sensors, or simply things are linked with each other over open communication networks. However, such an operation environment...

  • Article
  • Open Access
6 Citations
5,212 Views
24 Pages

Improvements on Making BKW Practical for Solving LWE

  • Alessandro Budroni,
  • Qian Guo,
  • Thomas Johansson,
  • Erik Mårtensson and
  • Paul Stankovski Wagner

The learning with errors (LWE) problem is one of the main mathematical foundations of post-quantum cryptography. One of the main groups of algorithms for solving LWE is the Blum–Kalai–Wasserman (BKW) algorithm. This paper presents new improvements of...

  • Article
  • Open Access
11 Citations
8,065 Views
20 Pages

This paper studies the use of deep learning (DL) models under a known-plaintext scenario. The goal of the models is to predict the secret key of a cipher using DL techniques. We investigate the DL techniques against different ciphers, namely, Simplif...

  • Article
  • Open Access
45 Citations
14,307 Views
19 Pages

Individual users’ sensitive information, such as heart rate, calories burned, or even sleep patterns, are casually tracked by smart wearable devices to be further processed or exchanged, utilizing the ubiquitous capabilities of Internet of Things (Io...

  • Article
  • Open Access
26 Citations
6,831 Views
25 Pages

Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach

  • Hossein Sayadi,
  • Yifeng Gao,
  • Hosein Mohammadi Makrani,
  • Jessica Lin,
  • Paulo Cesar Costa,
  • Setareh Rafatirad and
  • Houman Homayoun

According to recent security analysis reports, malicious software (a.k.a. malware) is rising at an alarming rate in numbers, complexity, and harmful purposes to compromise the security of modern computer systems. Recently, malware detection based on...

  • Article
  • Open Access
16 Citations
6,071 Views
29 Pages

Parallel Privacy-Preserving Shortest Path Algorithms

  • Mohammad Anagreh,
  • Peeter Laud and
  • Eero Vainikko

In this paper, we propose and present secure multiparty computation (SMC) protocols for single-source shortest distance (SSSD) and all-pairs shortest distance (APSD) in sparse and dense graphs. Our protocols follow the structure of classical algorith...

  • Article
  • Open Access
1 Citations
3,709 Views
22 Pages

A differential fault attack framework for the Enocoro family of stream ciphers is presented. We only require that the attacker can reset the internal state and inject a random byte-fault, in a random register, during a known time period. For a single...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X