You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 7, Issue 2

June 2023 - 17 articles

Cover Story: The rise of quantum computing brings the threat of quicker brute force attacks, prompting the need for Post-Quantum Cryptography such as the NTRU cryptosystem. However, its main drawback is the lengthy polynomial multiplication process. To address this, a HW/SW co-design approach is proposed to accelerate polynomial multiplication in resource-constrained devices. Various HW multiplication strategies are analyzed, prioritizing timing security and optimizing available resources. The resulting multiplier is encapsulated as a reusable IP module with standard interconnection buses, facilitating integration into programmable devices. Depending on resource constraints, accelerations of 30–45 times compared to SW-level multiplication are achieved, with a device occupancy of approximately 5%. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
2,798 Views
19 Pages

All anonymous identity-based encryption (IBE) schemes that are group homomorphic (to the best of our knowledge) require knowledge of the identity to compute the homomorphic operation. This paper is motivated by this open problem, namely to construct...

  • Article
  • Open Access
5 Citations
4,561 Views
18 Pages

A Multi-Party Functional Signatures Scheme for Private Blockchain

  • Quan Zhou,
  • Yulong Zheng,
  • Kaijun Wei,
  • Minhui Chen and
  • Zhikang Zeng

Digital signature technology is essential for ensuring the authenticity and unforgeability of transactions in a private blockchain framework. In some scenarios, transactions require verification from multiple parties, each of whom needs to authentica...

  • Article
  • Open Access
15 Citations
3,952 Views
22 Pages

Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

  • Mua’ad Abu-Faraj,
  • Abeer Al-Hyari,
  • Charlie Obimbo,
  • Khaled Aldebei,
  • Ismail Altaharwa,
  • Ziad Alqadi and
  • Orabe Almanaseer

This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension privat...

  • Article
  • Open Access
26 Citations
4,138 Views
18 Pages

In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which achieves an extremely low resource usage with very good overall performan...

  • Article
  • Open Access
10 Citations
4,007 Views
13 Pages

SCANN: Side Channel Analysis of Spiking Neural Networks

  • Karthikeyan Nagarajan,
  • Rupshali Roy,
  • Rasit Onur Topaloglu,
  • Sachhidh Kannan and
  • Swaroop Ghosh

Spiking neural networks (SNNs) are quickly gaining traction as a viable alternative to deep neural networks (DNNs). Compared to DNNs, SNNs are computationally more powerful and energy efficient. The design metrics (synaptic weights, membrane threshol...

  • Article
  • Open Access
5 Citations
3,652 Views
17 Pages

While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X