You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 7, Issue 2

June 2023 - 17 articles

Cover Story: The rise of quantum computing brings the threat of quicker brute force attacks, prompting the need for Post-Quantum Cryptography such as the NTRU cryptosystem. However, its main drawback is the lengthy polynomial multiplication process. To address this, a HW/SW co-design approach is proposed to accelerate polynomial multiplication in resource-constrained devices. Various HW multiplication strategies are analyzed, prioritizing timing security and optimizing available resources. The resulting multiplier is encapsulated as a reusable IP module with standard interconnection buses, facilitating integration into programmable devices. Depending on resource constraints, accelerations of 30–45 times compared to SW-level multiplication are achieved, with a device occupancy of approximately 5%. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
7 Citations
2,465 Views
14 Pages

In the blockchain network, the communication delay between different nodes is a great threat to the distributed ledger consistency of each miner. Blockchain is the core technology of Bitcoin. At present, some research has proven the security of the P...

  • Article
  • Open Access
2 Citations
2,542 Views
14 Pages

Inspired by the advancements in (fully) homomorphic encryption in recent decades and its practical applications, we conducted a preliminary study on the underlying mathematical structure of the corresponding schemes. Hence, this paper focuses on inve...

  • Review
  • Open Access
11 Citations
7,959 Views
17 Pages

Secure Firmware Update: Challenges and Solutions

  • Luigi Catuogno and
  • Clemente Galdi

The pervasiveness of IoT and embedded devices allows the deployment of services that were unthinkable only few years ago. Such devices are typically small, run unattended, possibly on batteries and need to have a low cost of production. As all softwa...

  • Article
  • Open Access
4 Citations
3,471 Views
22 Pages

Timing-Attack-Resistant Acceleration of NTRU Round 3 Encryption on Resource-Constrained Embedded Systems

  • Eros Camacho-Ruiz,
  • Macarena C. Martínez-Rodríguez,
  • Santiago Sánchez-Solano and
  • Piedad Brox

The advent of quantum computing with high processing capabilities will enable brute force attacks in short periods of time, threatening current secure communication channels. To mitigate this situation, post-quantum cryptography (PQC) algorithms have...

  • Article
  • Open Access
8 Citations
3,763 Views
18 Pages

Currently, cloud computing has become increasingly popular and thus, many people and institutions choose to put their data into the cloud instead of local environments. Given the massive amount of data and the fidelity of cloud servers, adequate secu...

  • Article
  • Open Access
11 Citations
13,081 Views
21 Pages

Blockchain-Based Electronic Voting: A Secure and Transparent Solution

  • Bruno Miguel Batista Pereira,
  • José Manuel Torres,
  • Pedro Miguel Sobral,
  • Rui Silva Moreira,
  • Christophe Pinto de Almeida Soares and
  • Ivo Pereira

Since its appearance in 2008, blockchain technology has found multiple uses in fields such as banking, supply chain management, and healthcare. One of the most intriguing uses of blockchain is in voting systems, where the technology can overcome the...

  • Article
  • Open Access
5 Citations
5,225 Views
14 Pages

Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications

  • Luis Parrilla,
  • Antonio García,
  • Encarnación Castillo,
  • Juan Antonio López-Villanueva and
  • Uwe Meyer-Baese

The generation of random numbers is crucial for practical implementations of cryptographic algorithms. In this sense, hardware security modules (HSMs) include true random number generators (TRNGs) implemented in hardware to achieve good random number...

  • Article
  • Open Access
1 Citations
2,792 Views
24 Pages

LACT+: Practical Post-Quantum Scalable Confidential Transactions

  • Jayamine Alupotha,
  • Xavier Boyen and
  • Matthew McKague

A “confidential monetary value” carries information about the real monetary value but does not disclose it. Post-quantum private blockchains with confidential monetary values—large-sized blockchains with large verification times&mda...

  • Article
  • Open Access
4 Citations
2,971 Views
17 Pages

Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment

  • Pallavi Kulkarni,
  • Rajashri Khanai,
  • Dattaprasad Torse,
  • Nalini Iyer and
  • Gururaj Bindagi

The cloud provides on-demand, high-quality services to its users without the burden of managing hardware and software. Though the users benefit from the remote services provided by the cloud, they do not have their personal data in their physical pos...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X