Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 8, Issue 3

2024 September - 17 articles

Cover Story: The hash value of every node depends on the hash values of its children and next nodes (dashed lines). Nodes must be constructed sequentially (from the last to the first) by the Prover. After receiving the hash value of the root node, the Verifier selects a leaf node, say node 12, and the hash values of the colored nodes are transmitted by the Prover so that the hash values of the red nodes can be recomputed without additional knowledge on the hashcash tree. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
10 Citations
7,873 Views
19 Pages

Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities

  • Oleksandr Kuznetsov,
  • Alex Rusnak,
  • Anton Yezhov,
  • Kateryna Kuznetsova,
  • Dzianis Kanonik and
  • Oleksandr Domin

Addressing the critical challenge of ensuring data integrity in decentralized systems, this paper delves into the underexplored area of data falsification probabilities within Merkle Trees, which are pivotal in blockchain and Internet of Things (IoT)...

  • Article
  • Open Access
2,116 Views
15 Pages

Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions

  • Jenilee Jao,
  • Ian Wilcox,
  • Jim Plusquellic,
  • Biliana Paskaleva and
  • Pavel Bochev

Random variations in microelectronic circuit structures represent the source of entropy for physical unclonable functions (PUFs). In this paper, we investigate delay variations that occur through the routing network and switch matrices of a field-pro...

  • Article
  • Open Access
11 Citations
8,205 Views
15 Pages

Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles

  • Dana Sairangazhykyzy Amirkhanova,
  • Maksim Iavich and
  • Orken Mamyrbayev

Modern technologies like quantum and cloud computing have reshaped computing, offering immense power and scalability. While beneficial, they also challenge the security of traditional cryptographic systems. Quantum computing threatens RSA and ECC wit...

  • Article
  • Open Access
1,733 Views
16 Pages

Improve Parallel Resistance of Hashcash Tree

  • Mario Alviano and
  • Giada Gabriele

Denial of Service (DoS) attacks remain a persistent threat to online systems, necessitating continual innovation in defense mechanisms. In this work, we present an improved algorithm for mitigating DoS attacks through the augmentation of client puzzl...

  • Article
  • Open Access
1 Citations
2,656 Views
23 Pages

Public Key Protocols from Twisted-Skew Group Rings

  • Javier de la Cruz,
  • Edgar Martínez-Moro,
  • Steven Muñoz-Ruiz and
  • Ricardo Villanueva-Polanco

This article studies some algebraic structures known as twisted-skew group rings in the context of public key cryptography. We first present some background related to these structures to then specifically introduce particular twisted-skew group ring...

  • Article
  • Open Access
6 Citations
6,823 Views
13 Pages

Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation

  • Oleksandr Kuznetsov,
  • Alex Rusnak,
  • Anton Yezhov,
  • Dzianis Kanonik,
  • Kateryna Kuznetsova and
  • Oleksandr Domin

Zero-knowledge proofs have emerged as a powerful tool for enhancing privacy and security in blockchain applications. However, the efficiency and scalability of proof systems remain a significant challenge, particularly in the context of Merkle tree i...

  • Article
  • Open Access
4 Citations
4,201 Views
31 Pages

The Emerging Challenges of Wearable Biometric Cryptosystems

  • Khalid Al Ajlan,
  • Tariq Alsboui,
  • Omar Alshaikh,
  • Isa Inuwa-Dute,
  • Saad Khan and
  • Simon Parkinson

Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X