You are currently viewing a new version of our website. To view the old version click .

Cryptography, Volume 9, Issue 4

December 2025 - 21 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (21)

  • Article
  • Open Access
487 Views
28 Pages

Symmetric cryptography is essential for secure communication as it ensures confidentiality by using shared secret keys. This paper proposes a novel substitution-permutation network (SPN) that integrates Latin squares, permutations, and Reed-Muller (R...

  • Article
  • Open Access
387 Views
23 Pages

A Lightweight Decentralized Medical Data Sharing Scheme with Dual Verification

  • Shaobo Zhang,
  • Yijie Yin,
  • Nangui Chen and
  • Honghui Ning

The rapid growth of smart healthcare improves medical efficiency through electronic data sharing but introduces security risks like privacy leaks and data tampering. However, existing ciphertext-policy attribute-based encryption faces challenges such...

  • Article
  • Open Access
693 Views
33 Pages

Enhancing Multi-Factor Authentication with Templateless 2D/3D Biometrics and PUF Integration for Securing Smart Devices

  • Saloni Jain,
  • Amisha Bagri,
  • Maxime Cambou,
  • Dina Ghanai Miandoab and
  • Bertrand Cambou

Secure authentication in smart device ecosystems remains a critical challenge, particularly due to the irrevocability of compromised biometric templates in server-based systems. This paper presents a post-quantum secure multi-factor authentication pr...

  • Article
  • Open Access
1,021 Views
23 Pages

Substitution boxes (S-Boxes) are the core components of modern block ciphers, responsible for introducing the essential nonlinearity that protects against attacks like linear and differential cryptanalysis. For an 8-bit S-Box, the highest possible no...

  • Article
  • Open Access
826 Views
28 Pages

Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes. While the former has been standardized by the Nat...

  • Article
  • Open Access
1,400 Views
18 Pages

A Two-Layer Transaction Network-Based Method for Virtual Currency Address Identity Recognition

  • Lingling Xia,
  • Tao Zhu,
  • Zhengjun Jing,
  • Qun Wang,
  • Zhuo Ma,
  • Zimo Huang and
  • Ziyu Yin

Digital currencies, led by Bitcoin and USDT, are characterized by decentralization and anonymity, which obscure the identities of traders and create a conducive environment for illicit activities such as drug trafficking, money laundering, cyber frau...

  • Article
  • Open Access
1,870 Views
20 Pages

Comparative Deep Learning-Based Side-Channel Analysis of an FPGA-Based CRYSTALS-Kyber NTT Accelerator

  • Munkhbaatar Chinbat,
  • Liji Wu,
  • Xiangmin Zhang,
  • Yifan Yang and
  • Man Wei

Deep learning-based side-channel analysis is one of the most effective techniques for extracting and classifying sensitive information from a target device. This paper demonstrates the best-performing deep learning model for the target implementation...

  • Article
  • Open Access
943 Views
31 Pages

An Optimized Framework for Detecting Suspicious Accounts in the Ethereum Blockchain Network

  • Noha E. El-Attar,
  • Marwa H. Salama,
  • Mohamed Abdelfattah and
  • Sanaa Taha

Detecting, tracking, and preventing cryptocurrency money laundering within blockchain systems is a major challenge for governments worldwide. This paper presents an anomaly detection model based on blockchain technology and machine learning to identi...

  • Review
  • Open Access
2,021 Views
39 Pages

A Survey of Post-Quantum Oblivious Protocols

  • Altana Khutsaeva,
  • Anton Leevik and
  • Sergey Bezzateev

Modern distributed computing systems and applications with strict privacy requirements demand robust data confidentiality. A primary challenge involves enabling parties to exchange data or perform joint computations. These interactions must avoid rev...

  • Review
  • Open Access
1,913 Views
19 Pages

From Black Boxes to Glass Boxes: Explainable AI for Trustworthy Deepfake Forensics

  • Hanwei Qian,
  • Lingling Xia,
  • Ruihao Ge,
  • Yiming Fan,
  • Qun Wang and
  • Zhengjun Jing

As deepfake technology matures, its risks in spreading false information and threatening personal and societal security are escalating. Despite significant accuracy improvements in existing detection models, their inherent opacity limits their practi...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X