You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 9, Issue 4

December 2025 - 21 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (21)

  • Article
  • Open Access
165 Views
20 Pages

Role-Based Efficient Proactive Secret Sharing with User Revocation

  • Yixuan He,
  • Yuta Kodera,
  • Yasuyuki Nogami and
  • Samsul Huda

Proactive secret sharing (PSS), an extension of secret-sharing schemes, safeguards sensitive data in dynamic distributed networks by periodically refreshing shares to counter adversarial attacks. In our previous work, we constructed a non-interactive...

  • Article
  • Open Access
88 Views
23 Pages

Efficient CCA2-Secure IBKEM from Lattices in the Standard Model

  • Ngoc Ai Van Nguyen,
  • Dung Hoang Duong and
  • Minh Thuy Truc Pham

Recent work at SCN 2020 by Boyen, Izabachène, and Li introduced a lattice-based key-encapsulation mechanism (KEM) that achieves CCA2-security in the standard model without relying on generic transformations. Their proof, however, leaves a few...

  • Article
  • Open Access
1 Citations
279 Views
16 Pages

Flexible and Area-Efficient Codesign Implementation of AES on FPGA

  • Oussama Azzouzi,
  • Mohamed Anane,
  • Mohamed Chahine Ghanem,
  • Yassine Himeur and
  • Dominik Wojtczak

As embedded and IoT systems demand secure and compact encryption, developing cryptographic solutions that are both lightweight and efficient remains a major challenge. Many existing AES implementations either lack flexibility or consume excessive har...

  • Article
  • Open Access
591 Views
25 Pages

Data security is essential for protecting sensitive information that could compromise both the sender and the receiver. Encryption mechanisms, such as the Advanced Encryption Standard (AES), play a key role in this protection. However, encrypting or...

  • Article
  • Open Access
235 Views
27 Pages

Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access...

  • Article
  • Open Access
240 Views
16 Pages

STAR: Self-Training Assisted Refinement for Side-Channel Analysis on Cryptosystems

  • Yuheng Qian,
  • Jing Gao,
  • Yuhan Qian,
  • Yaoling Ding and
  • An Wang

Reconstructing cryptographic operation sequences through side-channel analysis is essential for recovering private keys, but practical attacks are hindered by unlabeled, noisy, and high-dimensional power traces that challenge accurate classification....

  • Review
  • Open Access
742 Views
34 Pages

A Review on Blockchain-Based Trust and Reputation Schemes in Metaverse Environments

  • Firdous Kausar,
  • Hafiz M. Asif,
  • Sajid Hussain and
  • Shahid Mumtaz

The metaverse represents a transformative integration of virtual and physical worlds, offering unprecedented opportunities for social interaction, commerce, education, healthcare, and entertainment. Establishing trust in these expansive and decentral...

  • Article
  • Open Access
1,205 Views
24 Pages

The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS). As conventional...

  • Article
  • Open Access
378 Views
30 Pages

As quantum computing continues to advance, it threatens the long-term protection of traditional cryptographic methods, especially in biometric authentication systems where it is important to protect sensitive data. To overcome this challenge, we pres...

  • Article
  • Open Access
281 Views
22 Pages

As electric vehicles (EVs) gain popularity, the existing public charging infrastructure is struggling to keep pace with the rapidly growing demand for the immediate charging needs of EVs. V2V power trading has gradually attracted widespread attention...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X