You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 6, Issue 3

September 2022 - 17 articles

Cover Story: A periodic, built-in self-test countermeasure is proposed for detecting faults in microprocessors that can lead to information leakage. Information leakage is defined as sensitive information, e.g., encryption keys, that is inadvertently sent to I/O ports when a fault occurs. A counter is proposed that flags errors when the number of execution cycles of an encryption algorithm differs from a fault-free value. The counter is shown to detect all leakage faults when placed in the branch compare logic of the microprocessor. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
18 Citations
5,179 Views
20 Pages

With the growing utility of blockchain technology, the desire for reciprocal interactions among different blockchains is growing. However, most operational blockchain networks currently operate in a standalone setting. This fragmentation in the form...

  • Article
  • Open Access
5 Citations
3,849 Views
21 Pages

Subliminal Channels in Visual Cryptography

  • Katarzyna Koptyra and
  • Marek R. Ogiela

This paper describes three methods of creating a subliminal channel in visual cryptography that are defined for a (2,2) sharing scheme. They work by hiding additional covert information besides the original encrypted image. The first channel is revea...

  • Article
  • Open Access
18 Citations
6,310 Views
13 Pages

Security is an important aspect of healthcare applications that employ Internet of Things (IoT) technology. More specifically, providing privacy and ensuring the confidentiality, integrity and authenticity of IoT-based designs are crucial in the heal...

  • Article
  • Open Access
25 Citations
4,098 Views
33 Pages

Combining Markov and Semi-Markov Modelling for Assessing Availability and Cybersecurity of Cloud and IoT Systems

  • Vyacheslav Kharchenko,
  • Yuriy Ponochovnyi,
  • Oleg Ivanchenko,
  • Herman Fesenko and
  • Oleg Illiashenko

This paper suggests a strategy (C5) for assessing cloud and IoT system (CIS) dependability, availability, and cybersecurity based on the continuous collection, comparison, choice, and combination of Markov and semi-Markov models (MMs and SMMs). It pr...

  • Article
  • Open Access
1 Citations
3,686 Views
19 Pages

A Security Analysis of Circuit Clock Obfuscation

  • Rajesh Datta,
  • Guangwei Zhao,
  • Kanad Basu and
  • Kaveh Shamsi

Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated circuit from an untrusted foundry or end-user. The technique is based on creating ambiguity in the original circuit by inserting &...

  • Article
  • Open Access
2,300 Views
18 Pages

How Hard Is It to Detect Surveillance? A Formal Study of Panopticons and Their Detectability Problem

  • Vasiliki Liagkou,
  • Panayotis E. Nastou,
  • Paul Spirakis and
  • Yannis C. Stamatiou

The Panopticon (which means “watcher of everything”) is a well-known prison structure of continuous surveillance and discipline studied by Bentham in 1785. Today, where persistent, massive scale, surveillance is immensely facilitated by n...

  • Review
  • Open Access
10 Citations
6,100 Views
29 Pages

The ever-increasing need for securing computing systems using cryptographic algorithms is spurring interest in the efficient implementation of common algorithms. While the algorithms can be implemented in software using base instruction sets, there i...

  • Review
  • Open Access
15 Citations
5,697 Views
15 Pages

Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access control system with high flexibility and efficiency by labelin...

  • Article
  • Open Access
3 Citations
4,160 Views
22 Pages

The evolution of smart contracts in recent years inspired a crucial question: do smart contract evaluation protocols provide the required level of privacy when executing contracts on the blockchain? The Hawk (IEEE S&P ’16) paper introduces...

  • Article
  • Open Access
4 Citations
3,433 Views
24 Pages

Node Monitoring as a Fault Detection Countermeasure against Information Leakage within a RISC-V Microprocessor

  • Donald E. Owen,
  • Jithin Joseph,
  • Jim Plusquellic,
  • Tom J. Mannos and
  • Brian Dziki

Advanced, superscalar microprocessors (μP) are highly susceptible to wear-out failures because of their highly complex, densely packed circuit structure and extreme operational frequencies. Although many types of fault detection and mitigation str...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X