You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 8, Issue 4

December 2024 - 15 articles

Cover Story: Securing implantable medical devices (IMDs) is challenging due to their limited resources (e.g., battery and computing power) and the critical nature of their tasks. Security techniques for IMDs include biometric-based authentication, proximity-limited communication for the prevention of eavesdropping, lightweight cryptographic protocols, anomaly detection, and auditing systems. Various surveys have categorized threats into telemetry interference, software vulnerabilities, and hardware issues, analyzing solutions for each. While traditional approaches focus on access control and encryption, newer methods consider machine learning as a potential tool for IMD security. This paper systematizes existing IMD security research, emphasizing the importance of machine learning and identifying key techniques for secure deployment in medical infrastructure. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (15)

  • Article
  • Open Access
1 Citations
2,174 Views
21 Pages

Two-Party Threshold Private Set Intersection Protocols from Lightweight Cryptographic Primitives

  • Shengnan Zhao,
  • Chuan Zhao,
  • Yuchen Huang,
  • Xiangfu Song and
  • Qiuliang Xu

Private Set Intersection (PSI) is a significant application of interest within Secure Multi-party Computation (MPC), even though we are still in the early stages of deploying MPC solutions to real-world problems. Threshold PSI (tPSI), a variant of PS...

  • Feature Paper
  • Article
  • Open Access
2,694 Views
20 Pages

On the Proof of Ownership of Digital Wallets

  • Chen Wang,
  • Zi-Yuan Liu and
  • Masahiro Mambo

With the widespread adoption and increasing application of blockchain technology, cryptocurrency wallets used in Bitcoin and Ethereum play a crucial role in facilitating decentralized asset management and secure transactions. However, wallet security...

  • Article
  • Open Access
1 Citations
2,540 Views
15 Pages

This paper introduces a novel approach based on matrix multiplication in Fpn×n, which enables methods for public key exchange, user authentication, digital signatures, blockchain integration, and homomorphic encryption. Unlike traditional algor...

  • Article
  • Open Access
1,962 Views
17 Pages

Improving the Security of the LCB Block Cipher Against Deep Learning-Based Attacks

  • Indrakanti Aishwarya,
  • Lakshmy Koduvayur Viswanathan,
  • Chungath Srinivasan,
  • Girish Mishra,
  • Saibal K. Pal and
  • M. Sethumadhavan

This study presents a robust version of Light Cipher Block (LCB) by addressing the vulnerabilities identified in previous versions. The vulnerabilities in LCB, including a linear S-Box, improper bit shuffling, and subkey reusability, were thoroughly...

  • Article
  • Open Access
1 Citations
2,560 Views
17 Pages

New Weak Keys with Parity Patterns in the RC4 Stream Cipher

  • Evaristo José Madarro-Capó,
  • Carlos Miguel Legón-Pérez ,
  • Guillermo Sosa-Gómez and
  • Omar Rojas

The RC4 cryptographic algorithm is the most extensively studied stream cipher of the past two decades. This extensive research has resulted in numerous publications, many of which identify various vulnerabilities. Although these vulnerabilities do no...

  • Feature Paper
  • Article
  • Open Access
3 Citations
5,025 Views
17 Pages

Implantable Medical Device Security

  • Luigi Catuogno and
  • Clemente Galdi

Implantable medical devices, or IMDs for short, are medical instruments that are placed into the human body through surgery. IMDs are typically used for treating chronic diseases. Currently available IMDs are capable of communicating using wireless c...

  • Article
  • Open Access
2 Citations
1,513 Views
18 Pages

With the rapid development of information technology from one side and the experience of the COVID-19 pandemic from the other side, people presently prefer to access healthcare services remotely. Telecare Medical Information System (TMIS) provides mo...

  • Feature Paper
  • Article
  • Open Access
2 Citations
3,377 Views
30 Pages

A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol

  • Laerte Peotta de Melo,
  • Dino Macedo Amaral,
  • Robson de Oliveira Albuquerque,
  • Rafael Timóteo de Sousa Júnior,
  • Ana Lucila Sandoval Orozco and
  • Luis Javier García Villalba

The article presents an innovative approach for secure authentication in internet banking transactions, utilizing an Out-of-Band visual two-factor authorization protocol. With the increasing rise of cyber attacks and fraud, new security models are ne...

  • Feature Paper
  • Article
  • Open Access
1,834 Views
46 Pages

With the rapid advances in quantum computing, quantum security is now an indispensable property for any cryptographic system. In this paper, we study how to prove the security of a complex cryptographic system in the quantum random oracle model. We f...

  • Article
  • Open Access
2,326 Views
18 Pages

After the end of IPv4 addresses, the Internet is moving towards IPv6 address architecture quickly with the support of virtualization techniques worldwide. IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X