You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 9, Issue 2

June 2025 - 26 articles

Cover Story: The scale and capabilities of quantum computing, combined with emerging fault-tolerant quantum chips, highlight the urgent need for advanced security and privacy solutions in the quantum artificial intelligence and Quantum Internet of Things (QIoT) era. Quantum physical unclonable functions offer a security solution by leveraging the inherent randomness of quantum hardware to generate unique and tamper-resistant cryptographic fingerprints based on quantum mechanics. This work explores integrating QPUF within a Security-by-Design framework for industrial cyber–physical systems (I-CPS). We propose a sustainable and scalable security architecture for trusted attestation of the Quantum-Industrial Internet of Things (QIIoT). Evaluations on IBM and Google quantum platforms validate the strong potential of quantum computing-driven I-CPS security for future smart industrial applications. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (26)

  • Article
  • Open Access
1 Citations
1,822 Views
16 Pages

Reliability Improvement of 28 nm Intel FPGA Ring Oscillator PUF for Chip Identification

  • Zulfikar Zulfikar,
  • Hubbul Walidainy,
  • Aulia Rahman and
  • Kahlil Muchtar

The Ring Oscillator Physical Unclonable Function (RO-PUF) is a hardware security innovation that creates a secure and distinct identifier by utilizing the special physical properties of ring oscillators. Their unique response, low hardware overhead,...

  • Article
  • Open Access
1 Citations
2,496 Views
33 Pages

As more Internet of Things (IoT) devices are being used, more sensitive data and services are also being hosted by, or accessed via, IoT devices. This leads to a need for a stronger authentication solution for the IoT context, and a stronger authenti...

  • Article
  • Open Access
2 Citations
2,989 Views
20 Pages

QPUF: Quantum Physical Unclonable Functions for Security-by-Design of Industrial Internet-of-Things

  • Venkata K. V. V. Bathalapalli,
  • Saraju P. Mohanty,
  • Chenyun Pan and
  • Elias Kougianos

This research investigates the integration of quantum hardware-assisted security into critical applications, including the Industrial Internet-of-Things (IIoT), Smart Grid, and Smart Transportation. The Quantum Physical Unclonable Functions (QPUF) ar...

  • Article
  • Open Access
1 Citations
2,120 Views
23 Pages

The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. To overcome the existing privacy issues, we can apply fully homomorphic encryption (FHE) to encrypt...

  • Article
  • Open Access
8 Citations
10,350 Views
27 Pages

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

  • Maryam Abbasi,
  • Filipe Cardoso,
  • Paulo Váz,
  • José Silva and
  • Pedro Martins

The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). Thi...

  • Feature Paper
  • Review
  • Open Access
2 Citations
3,709 Views
37 Pages

Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives

  • Siddhartha Siddhiprada Bhoi,
  • Arathi Arakala,
  • Amy Beth Corman and
  • Asha Rao

Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computa...

  • Article
  • Open Access
1,087 Views
17 Pages

General Extensions and Improvements of Algebraic Persistent Fault Analysis

  • Hanbing Li,
  • Kexin Qiao,
  • Ye Xu,
  • Changhai Ou and
  • An Wang

Algebraic persistent fault analysis (APFA) combines algebraic analysis with persistent fault analysis, providing a novel approach for examining block cipher implementation security. Since its introduction, APFA has attracted considerable attention. T...

  • Article
  • Open Access
2,166 Views
29 Pages

Virtual reality (VR)/the metaverse is transforming into a ubiquitous technology by leveraging smart devices to provide highly immersive experiences at an affordable price. Cryptographically securing such augmented reality schemes is of paramount impo...

  • Article
  • Open Access
1,728 Views
18 Pages

A Quantum Key Distribution for Securing Smart Grids

  • Iuon-Chang Lin,
  • Ko-Yu Lin,
  • Nan-I Wu and
  • Min-Shiang Hwang

The development of Smart Grids (SGs) is a current trend and an indispensable essential living requirement. Due to economic development and improved quality of life, electricity demand has rapidly increased. However, the power grids in major cities ha...

  • Article
  • Open Access
1,039 Views
23 Pages

We present a new construction of a one-time pad (OTP) with inherent diffusive properties and a redundancy injection mechanism that benefits from them. The construction is based on interpreting the plaintext and key as members of a permutation group i...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X