You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 9, Issue 2

June 2025 - 26 articles

Cover Story: The scale and capabilities of quantum computing, combined with emerging fault-tolerant quantum chips, highlight the urgent need for advanced security and privacy solutions in the quantum artificial intelligence and Quantum Internet of Things (QIoT) era. Quantum physical unclonable functions offer a security solution by leveraging the inherent randomness of quantum hardware to generate unique and tamper-resistant cryptographic fingerprints based on quantum mechanics. This work explores integrating QPUF within a Security-by-Design framework for industrial cyber–physical systems (I-CPS). We propose a sustainable and scalable security architecture for trusted attestation of the Quantum-Industrial Internet of Things (QIIoT). Evaluations on IBM and Google quantum platforms validate the strong potential of quantum computing-driven I-CPS security for future smart industrial applications. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (26)

  • Article
  • Open Access
2,325 Views
17 Pages

Affine Cipher Encryption Technique Using Residue Number System

  • Mykhailo Kasianchuk,
  • Ruslan Shevchuk,
  • Bogdan Adamyk,
  • Vladlena Benson,
  • Inna Shylinska and
  • Mykhailo Holembiovskyi

This paper presents a new encryption technique, which combines affine ciphers and the residue number system. This makes it possible to eliminate the shortcomings and vulnerabilities of affine ciphers, which are sensitive to cryptanalysis, using the a...

  • Article
  • Open Access
1,099 Views
17 Pages

Bell–Clauser–Horne–Shimony–Holt Behavior Under Quantum Loss and Decoherence

  • Ottó Hanyecz,
  • András Bodor,
  • Peter Adam and
  • Mátyás Koniorczyk

We present a detailed analysis of the effect of quantum loss and decoherence in the Bell-CHSH scenario. Adopting a device-independent approach, we study the change in the bipartite conditional probability distribution, i.e., the behavior of the reali...

  • Article
  • Open Access
1 Citations
2,986 Views
18 Pages

Healthcare data is often fragmented across different institutions (hospitals, clinics, research centers), creating data silos. Privacy-enhancing technologies (PETs) play a fundamental role in collaborative healthcare analysis, enabling healthcare pro...

  • Article
  • Open Access
1 Citations
1,896 Views
22 Pages

Threshold Multi-Party Private Set Intersection (TMP-PSI) is a cryptographic protocol that enables an element from the receiver’s set to be included in the intersection result if it appears in the sets of at least t−1 other participants, w...

  • Article
  • Open Access
2 Citations
1,762 Views
26 Pages

Scalability and security restrictions are posing new challenges for blockchain networks, especially in the face of Distributed Denial-of-Service (DDoS) attacks and upcoming quantum threats. Previous research also found that post-quantum blockchains,...

  • Feature Paper
  • Article
  • Open Access
3 Citations
3,240 Views
21 Pages

Compact 8-Bit S-Boxes Based on Multiplication in a Galois Field GF(24)

  • Phuc-Phan Duong,
  • Tuan-Kiet Dang,
  • Trong-Thuc Hoang and
  • Cong-Kha Pham

Substitution boxes (S-Boxes) function as essential nonlinear elements in contemporary cryptographic systems, offering robust protection against cryptanalytic attacks. This study presents a novel technique for generating compact 8-bit S-Boxes based on...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X