You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 7, Issue 4

December 2023 - 19 articles

Cover Story: Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and doubling operations consist of many modular multiplications of large operands. Accelerating modular multiplication is therefore important for high-performance ECC. This paper presents the hardware implementations of modular multiplication algorithms, including interleaved modular multiplication, Montgomery modular multiplication, shift-sub modular multiplication (SSMM), SSMM with advance preparation, and SSMM with CSAs and sign detection algorithms. We also present the ECC hardware implementations based on the Secp256k1 protocol in affine, projective, and Jacobian coordinates, and evaluate their cost and performance. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (19)

  • Article
  • Open Access
5 Citations
2,458 Views
20 Pages

This paper presents a new quantum protocol designed to transmit information from one source to many recipients simultaneously. The proposed protocol, which is based on the phenomenon of entanglement, is completely distributed and is provably informat...

  • Article
  • Open Access
2 Citations
3,145 Views
24 Pages

We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial...

  • Article
  • Open Access
8 Citations
6,991 Views
21 Pages

RETRACTED: A Publicly Verifiable E-Voting System Based on Biometrics

  • Jinhui Liu,
  • Tianyi Han,
  • Maolin Tan,
  • Bo Tang,
  • Wei Hu and
  • Yong Yu

Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transpar...

  • Article
  • Open Access
1 Citations
4,096 Views
23 Pages

Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation

  • Mingfei Yu,
  • Dewmini Sudara Marakkalage and
  • Giovanni De Micheli

Garbled circuit (GC) is one of the few promising protocols to realize general-purpose secure computation. The target computation is represented by a Boolean circuit that is subsequently transformed into a network of encrypted tables for execution. Th...

  • Review
  • Open Access
7 Citations
9,369 Views
16 Pages

Comparative Study of Keccak SHA-3 Implementations

  • Alessandra Dolmeta,
  • Maurizio Martina and
  • Guido Masera

This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologi...

  • Article
  • Open Access
2 Citations
3,666 Views
19 Pages

In recent years, many companies have chosen to outsource data and other data computation tasks to cloud service providers to reduce costs and increase efficiency. However, there are risks of security and privacy breaches when users outsource data to...

  • Article
  • Open Access
6 Citations
3,723 Views
20 Pages

Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V

  • Geraldine Shirley Nicholas,
  • Dhruvakumar Vikas Aklekar,
  • Bhavin Thakar and
  • Fareena Saqib

With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, suc...

  • Article
  • Open Access
3 Citations
7,019 Views
29 Pages

Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits...

  • Article
  • Open Access
1 Citations
3,082 Views
23 Pages

In this paper, we introduce secure groups as a cryptographic scheme representing finite groups together with a range of operations, including the group operation, inversion, random sampling, and encoding/decoding maps. We construct secure groups from...

  • Review
  • Open Access
20 Citations
10,799 Views
30 Pages

Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X