Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 8, Issue 3

2024 September - 17 articles

Cover Story: The hash value of every node depends on the hash values of its children and next nodes (dashed lines). Nodes must be constructed sequentially (from the last to the first) by the Prover. After receiving the hash value of the root node, the Verifier selects a leaf node, say node 12, and the hash values of the colored nodes are transmitted by the Prover so that the hash values of the red nodes can be recomputed without additional knowledge on the hashcash tree. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
4 Citations
1,902 Views
16 Pages

Vehicular ad hoc networks (VANETs), which are the backbone of intelligent transportation systems (ITSs), facilitate critical data exchanges between vehicles. This necessitates secure transmission, which requires guarantees of message availability, in...

  • Article
  • Open Access
1 Citations
3,205 Views
18 Pages

A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts

  • Xingan Dai,
  • Xinquan Zhou,
  • Dehua Zhou,
  • Jinhan Zhong and
  • Chao Hong

In this paper, we propose a smart contract-based multi-candidate self-tallying voting scheme in order to guarantee the privacy of ballots in the case of multiple candidates. This scheme uses the ElGamal cryptosystem to ensure the security of the ball...

  • Article
  • Open Access
1 Citations
2,251 Views
16 Pages

Reversible data-hiding in encrypted images (RDHEI) plays a pivotal role in preserving privacy within images stored on cloud platforms. Recently, Wang et al. introduced a dual-stage permutation encryption scheme, which is highly compatible with RDHEI...

  • Article
  • Open Access
4 Citations
5,244 Views
12 Pages

The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions. As with many cryptograph...

  • Article
  • Open Access
4 Citations
3,397 Views
17 Pages

A Novel Method of Secured Data Distribution Using Sharding Zkp and Zero Trust Architecture in Blockchain Multi Cloud Environment

  • Komala Rangappa,
  • Arun Kumar Banavara Ramaswamy,
  • Mahadeshwara Prasad and
  • Shreyas Arun Kumar

In the era of cloud computing, guaranteeing the safety and effectiveness of data management is of utmost importance. This investigation presents a novel approach that amalgamates the sharding concept, encryption, zero-knowledge proofs (zkp), and bloc...

  • Article
  • Open Access
8 Citations
2,103 Views
17 Pages

Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves

  • Anatoly Bessalov,
  • Volodymyr Sokolov and
  • Serhii Abramov

The article presents the author’s works in the field of modifications and modeling of the Post-Quantum Cryptography (PQC) Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) algorithm on non-cyclic supersingular Edwards curves and its pred...

  • Article
  • Open Access
6 Citations
5,158 Views
19 Pages

Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, ena...

  • Article
  • Open Access
1 Citations
2,869 Views
18 Pages

With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also w...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X