You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 6, Issue 3

September 2022 - 17 articles

Cover Story: A periodic, built-in self-test countermeasure is proposed for detecting faults in microprocessors that can lead to information leakage. Information leakage is defined as sensitive information, e.g., encryption keys, that is inadvertently sent to I/O ports when a fault occurs. A counter is proposed that flags errors when the number of execution cycles of an encryption algorithm differs from a fault-free value. The counter is shown to detect all leakage faults when placed in the branch compare logic of the microprocessor. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
41 Citations
6,014 Views
15 Pages

Light Weight Authentication Scheme for Smart Home IoT Devices

  • Vipin Kumar,
  • Navneet Malik,
  • Jimmy Singla,
  • N. Z. Jhanjhi,
  • Fathi Amsaad and
  • Abdul Razaque

In today’s world, the use of computer networks is everywhere, and to access the home network we use the Internet. IoT networks are the new range of these networks in which we try to connect different home appliances and try to give commands fro...

  • Article
  • Open Access
17 Citations
4,084 Views
25 Pages

Multi-Wavelength Quantum Key Distribution Emulation with Physical Unclonable Function

  • Brit Riggs,
  • Michael Partridge,
  • Bertrand Cambou,
  • Ian Burke,
  • Manuel Aguilar Rios,
  • Julie Heynssens and
  • Dina Ghanaimiandoab

This work details the theory and implementation of a multi-wavelength quantum key distribution (QKD) emulation system with a physical unclonable function (PUF). Multi-wavelength QKD can eliminate the need to share a subsection of the final key for ea...

  • Article
  • Open Access
5 Citations
3,772 Views
16 Pages

In contrast to the network security that relies on upper-layer encryption for the confidentiality and authenticity of communications, physical layer security (PLS) exploits the uniqueness and randomness of the physical channel to encrypt information...

  • Article
  • Open Access
32 Citations
10,251 Views
14 Pages

BFV-Based Homomorphic Encryption for Privacy-Preserving CNN Models

  • Febrianti Wibawa,
  • Ferhat Ozgur Catak,
  • Salih Sarp and
  • Murat Kuzlu

Medical data is frequently quite sensitive in terms of data privacy and security. Federated learning has been used to increase the privacy and security of medical data, which is a sort of machine learning technique. The training data is disseminated...

  • Article
  • Open Access
5 Citations
4,082 Views
26 Pages

A Batch Processing Technique for Wearable Health Crowd-Sensing in the Internet of Things

  • Abigail Akosua Addobea,
  • Qianmu Li,
  • Isaac Obiri Amankona and
  • Jun Hou

The influx of wearable sensor devices has influenced a new paradigm termed wearable health crowd-sensing (WHCS). WHCS enables wearable data collection through active sensing to provide health monitoring to users. Wearable sensing devices capture data...

  • Article
  • Open Access
9 Citations
4,548 Views
13 Pages

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts

  • Riccardo Longo,
  • Carla Mascia,
  • Alessio Meneghetti,
  • Giordano Santilli and
  • Giovanni Tognolini

Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries. Cryptography is, however, an ever-evolving discipline, and a...

  • Article
  • Open Access
6,265 Views
22 Pages

In this paper, we provide a detailed analysis of CPA and Template Attacks on masked implementations of bitsliced AES, targeting a 32-bit platform through the ChipWhisperer side-channel acquisition tool. Our results show that Template Attacks can reco...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X