You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 6, Issue 2

June 2022 - 17 articles

Cover Story: Split manufacturing is a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, its security promise has been challenged by various fab-based attacks which exploit the working principles of design tools. In this work, we formally define the security of split manufacturing and advocate accordingly for a novel, formally secure paradigm. Inspired by the notion of logic locking, we protect designs by embedding secret keys that are completed at the undisclosed back-end-of-line interconnects—the keys become truly indecipherable to fab-based attackers. Our technique is competitive with prior techniques in terms of layout overheads. We also promote an alternative implementation strategy without the need for splitting at all. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
6 Citations
3,871 Views
14 Pages

Certificate Management Scheme for VANETs Using Blockchain Structure

  • Maharage Nisansala Sevwandi Perera,
  • Toru Nakamura,
  • Masayuki Hashimoto,
  • Hiroyuki Yokoyama,
  • Chen-Mou Cheng and
  • Kouichi Sakurai

Vehicular Ad-hoc NETworks (VANETs), a special kind of Mobile Ad-hoc NETworks (MANETs), play an important role in Intelligent Transportation Systems (ITS). Via wireless technology, vehicles exchange information related to road conditions and their sta...

  • Article
  • Open Access
7 Citations
5,119 Views
17 Pages

A Memory Hierarchy Protected against Side-Channel Attacks

  • Ezinam Bertrand Talaki,
  • Olivier Savry,
  • Mathieu Bouvier Des Noes and
  • David Hely

In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory...

  • Review
  • Open Access
40 Citations
17,038 Views
52 Pages

The primary purpose of this paper is to bridge the technology gap between Blockchain and Fintech applications. Blockchain technology is already being explored in a wide number of Fintech sectors. After creating a unique taxonomy for Fintech ecosystem...

  • Article
  • Open Access
2 Citations
5,782 Views
18 Pages

Privacy Issues in Stylometric Methods

  • Antonios Patergianakis and
  • Konstantinos Limniotis

Stylometry is a well-known field, aiming to identify the author of a text, based only on the way she/he writes. Despite its obvious advantages in several areas, such as in historical research or for copyright purposes, it may also yield privacy and p...

  • Article
  • Open Access
69 Citations
17,482 Views
16 Pages

Benchmark Analysis of YOLO Performance on Edge Intelligence Devices

  • Haogang Feng,
  • Gaoze Mu,
  • Shida Zhong,
  • Peichang Zhang and
  • Tao Yuan

In the 5G intelligent edge scenario, more and more accelerator-based single-board computers (SBCs) with low power consumption and high performance are being used as edge devices to run the inferencing part of the artificial intelligence (AI) model to...

  • Article
  • Open Access
2 Citations
3,899 Views
18 Pages

The development of increasingly sophisticated quantum computers poses a long-term threat to current cryptographic infrastructure. This has spurred research into both quantum-resistant algorithms and how to safely transition real-world implementations...

  • Article
  • Open Access
3 Citations
3,724 Views
24 Pages

Mobile banking, shopping, and in-app purchases utilize persistent authentication states for access to sensitive data. One-shot authentication permits access for a fixed time period. For instance, a username/password-based authentication allows a user...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X