Skip to Content

Cryptography, Volume 6, Issue 3

2022 September - 17 articles

Cover Story: A periodic, built-in self-test countermeasure is proposed for detecting faults in microprocessors that can lead to information leakage. Information leakage is defined as sensitive information, e.g., encryption keys, that is inadvertently sent to I/O ports when a fault occurs. A counter is proposed that flags errors when the number of execution cycles of an encryption algorithm differs from a fault-free value. The counter is shown to detect all leakage faults when placed in the branch compare logic of the microprocessor. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
19 Citations
5,462 Views
20 Pages

With the growing utility of blockchain technology, the desire for reciprocal interactions among different blockchains is growing. However, most operational blockchain networks currently operate in a standalone setting. This fragmentation in the form...

  • Article
  • Open Access
5 Citations
4,146 Views
21 Pages

Subliminal Channels in Visual Cryptography

  • Katarzyna Koptyra and
  • Marek R. Ogiela

This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revea...

  • Article
  • Open Access
21 Citations
6,935 Views
13 Pages

Security is an important aspect of healthcare applications that employ Internet of Things (IoT) technology. More specifically, providing privacy and ensuring the confidentiality, integrity and authenticity of IoT-based designs are crucial in the heal...

  • Article
  • Open Access
27 Citations
4,562 Views
33 Pages

Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems

  • Vyacheslav Kharchenko,
  • Yuriy Ponochovnyi,
  • Oleg Ivanchenko,
  • Herman Fesenko and
  • Oleg Illiashenko

This paper suggests a strategy (C5) for assessing cloud and IoT system (CIS) dependability, availability, and cybersecurity based on the continuous collection, comparison, choice, and combination of Markov and semi-Markov models (MMs and SMMs). It pr...

  • Article
  • Open Access
2 Citations
3,940 Views
19 Pages

A Security Analysis of Circuit Clock Obfuscation

  • Rajesh Datta,
  • Guangwei Zhao,
  • Kanad Basu and
  • Kaveh Shamsi

Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated circuit from an untrusted foundry or end-user. The technique is based on creating ambiguity in the original circuit by inserting &...

  • Article
  • Open Access
2,460 Views
18 Pages

How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem

  • Vasiliki Liagkou,
  • Panayotis E. Nastou,
  • Paul Spirakis and
  • Yannis C. Stamatiou

The Panopticon (which means “watcher of everything”) is a well-known prison structure of continuous surveillance and discipline studied by Bentham in 1785. Today, where persistent, massive scale, surveillance is immensely facilitated by n...

  • Review
  • Open Access
11 Citations
6,870 Views
29 Pages

The ever-increasing need for securing computing systems using cryptographic algorithms is spurring interest in the efficient implementation of common algorithms. While the algorithms can be implemented in software using base instruction sets, there i...

  • Review
  • Open Access
18 Citations
6,216 Views
15 Pages

Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labelin...

  • Article
  • Open Access
3 Citations
4,411 Views
22 Pages

The evolution of smart contracts in recent years inspired a crucial question: do smart contract evaluation protocols provide the required level of privacy when executing contracts on the blockchain? The Hawk (IEEE S&P ’16) paper introduces...

  • Article
  • Open Access
4 Citations
3,654 Views
24 Pages

Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor

  • Donald E. Owen,
  • Jithin Joseph,
  • Jim Plusquellic,
  • Tom J. Mannos and
  • Brian Dziki

Advanced, superscalar microprocessors (μP) are highly susceptible to wear-out failures because of their highly complex, densely packed circuit structure and extreme operational frequencies. Although many types of fault detection and mitigation str...

  • Article
  • Open Access
44 Citations
6,550 Views
15 Pages

Light Weight Authentication Scheme for Smart Home IoT Devices

  • Vipin Kumar,
  • Navneet Malik,
  • Jimmy Singla,
  • N. Z. Jhanjhi,
  • Fathi Amsaad and
  • Abdul Razaque

In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands fro...

  • Article
  • Open Access
19 Citations
4,503 Views
25 Pages

Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function

  • Brit Riggs,
  • Michael Partridge,
  • Bertrand Cambou,
  • Ian Burke,
  • Manuel Aguilar Rios,
  • Julie Heynssens and
  • Dina Ghanaimiandoab

This work details the theory and implementation of a multi-wavelength quantum key distribution (QKD) emulation system with a physical unclonable function (PUF). Multi-wavelength QKD can eliminate the need to share a subsection of the final key for ea...

  • Article
  • Open Access
5 Citations
4,089 Views
16 Pages

In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness of the physical channel to encrypt information...

  • Article
  • Open Access
39 Citations
10,892 Views
14 Pages

BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models

  • Febrianti Wibawa,
  • Ferhat Ozgur Catak,
  • Salih Sarp and
  • Murat Kuzlu

Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated...

  • Article
  • Open Access
5 Citations
4,309 Views
26 Pages

A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things

  • Abigail Akosua Addobea,
  • Qianmu Li,
  • Isaac Obiri Amankona and
  • Jun Hou

The influx of wearable sensor devices has influenced a new paradigm termed wearable health crowd-sensing (WHCS). WHCS enables wearable data collection through active sensing to provide health monitoring to users. Wearable sensing devices capture data...

  • Article
  • Open Access
10 Citations
4,885 Views
13 Pages

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts

  • Riccardo Longo,
  • Carla Mascia,
  • Alessio Meneghetti,
  • Giordano Santilli and
  • Giovanni Tognolini

Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries. Cryptography is, however, an ever-evolving discipline, and a...

  • Article
  • Open Access
7,103 Views
22 Pages

In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool. Our results show that Template Attacks can reco...

XFacebookLinkedIn
Cryptography - ISSN 2410-387X