You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 6, Issue 2

June 2022 - 17 articles

Cover Story: Split manufacturing is a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, its security promise has been challenged by various fab-based attacks which exploit the working principles of design tools. In this work, we formally define the security of split manufacturing and advocate accordingly for a novel, formally secure paradigm. Inspired by the notion of logic locking, we protect designs by embedding secret keys that are completed at the undisclosed back-end-of-line interconnects—the keys become truly indecipherable to fab-based attackers. Our technique is competitive with prior techniques in terms of layout overheads. We also promote an alternative implementation strategy without the need for splitting at all. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
24 Citations
15,354 Views
12 Pages

ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3

  • Ronaldo Serrano,
  • Ckristian Duran,
  • Marco Sarmiento,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advan...

  • Article
  • Open Access
1 Citations
3,730 Views
21 Pages

Probabilistic Logic Models for the Lightning Network

  • Damiano Azzolini and
  • Fabrizio Riguzzi

The Lightning Network (LN) has emerged as one of the prominent solutions to overcome the biggest limit of blockchain based on PoW: scalability. LN allows for creating a layer on top of an existing blockchain where users can send payments and micro-pa...

  • Article
  • Open Access
22 Citations
4,124 Views
27 Pages

Due to great interest in the secure storage and transmission of color images, the necessity for an efficient and robust RGB image encryption technique has grown. RGB image encryption ensures the confidentiality of color images during storage and tran...

  • Review
  • Open Access
6 Citations
6,124 Views
39 Pages

Review of Chosen Isogeny-Based Cryptographic Schemes

  • Bartosz Drzazga and
  • Łukasz Krzywiecki

Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can brea...

  • Article
  • Open Access
3 Citations
3,215 Views
9 Pages

Locating Side Channel Leakage in Time through Matched Filters

  • Alessandro Barenghi,
  • Gioele Falcetti and
  • Gerardo Pelosi

Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices. One of the crucial steps for a side channel attack to succeed is the capability to locat...

  • Article
  • Open Access
16 Citations
5,646 Views
14 Pages

Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA

  • Binh Kieu-Do-Nguyen,
  • Cuong Pham-Quoc,
  • Ngoc-Thinh Tran,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), inter...

  • Article
  • Open Access
11 Citations
4,216 Views
15 Pages

Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation

  • Mohammad Almseidin,
  • Mouhammad Alkasassbeh,
  • Maen Alzubi and
  • Jamil Al-Sawwa

This paper introduces a novel detection method for phishing website attacks while avoiding the issues associated with the deficiencies of the knowledge-based representation and the binary decision. The suggested detection method was performed using F...

  • Article
  • Open Access
1 Citations
3,494 Views
16 Pages

Consensus algorithms are the building block of any decentralized network where the risk of malicious users is high. These algorithms are required to be robust, scalable, and secure in order to operate properly. Localized state-change consensus (LSC)...

  • Article
  • Open Access
2 Citations
4,561 Views
22 Pages

A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

  • Abhrajit Sengupta,
  • Mohammed Nabeel,
  • Mohammed Ashraf,
  • Johann Knechtel and
  • Ozgur Sinanoglu

Split manufacturing was introduced as a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, the security promise of split manufacturing has been challenged by various att...

  • Article
  • Open Access
2 Citations
3,157 Views
22 Pages

Computational Analysis of Interleaving PN-Sequences with Different Polynomials

  • Sara D. Cardell,
  • Verónica Requena and
  • Amparo Fúster-Sabater

Binary PN-sequences generated by LFSRs exhibit good statistical properties; however, due to their intrinsic linearity, they are not suitable for cryptographic applications. In order to break such a linearity, several approaches can be implemented. Fo...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X