You are currently viewing a new version of our website. To view the old version click .

Most Cited

  • Article
  • Open Access
98 Citations
31,840 Views
18 Pages

A Survey of Post-Quantum Cryptography: Start of a New Race

  • Duc-Thuan Dam,
  • Thai-Ha Tran,
  • Van-Phuc Hoang,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computer...

  • Article
  • Open Access
31 Citations
6,208 Views
25 Pages

A Survey of Consortium Blockchain and Its Applications

  • Xiaotong Chen,
  • Songlin He,
  • Linfu Sun,
  • Yangxin Zheng and
  • Chase Q. Wu

Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in a distributed network. While blockchain is well-known for its initial usage in a public manner, such as the cryptocurrency of Bitcoin, cons...

  • Article
  • Open Access
26 Citations
4,138 Views
18 Pages

In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which achieves an extremely low resource usage with very good overall performan...

  • Article
  • Open Access
24 Citations
18,597 Views
26 Pages

Applications of Neural Network-Based AI in Cryptography

  • Abderrahmane Nitaj and
  • Tajjeeddine Rachidi

Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, and videos. Other essential t...

  • Review
  • Open Access
20 Citations
10,799 Views
30 Pages

Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security...

  • Article
  • Open Access
19 Citations
9,869 Views
30 Pages

Random Number Generators: Principles and Applications

  • Anastasios Bikos,
  • Panagiotis E. Nastou,
  • Georgios Petroudis and
  • Yannis C. Stamatiou

In this paper, we present approaches to generating random numbers, along with potential applications. Rather than trying to provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, we focus on so...

  • Article
  • Open Access
17 Citations
3,998 Views
18 Pages

Boosting Quantum Key Distribution via the End-to-End Loss Control

  • Aleksei D. Kodukhov,
  • Valeria A. Pastushenko,
  • Nikita S. Kirsanov,
  • Dmitry A. Kronberg,
  • Markus Pflitsch and
  • Valerii M. Vinokur

With the rise of quantum technologies, data security increasingly relies on quantum cryptography and its most notable application, quantum key distribution (QKD). Yet, current technological limitations, in particular, the unavailability of quantum re...

  • Article
  • Open Access
17 Citations
7,887 Views
38 Pages

The digitization of healthcare data has presented a pressing need to address privacy concerns within the realm of machine learning for healthcare institutions. One promising solution is federated learning, which enables collaborative training of deep...

  • Article
  • Open Access
17 Citations
5,718 Views
17 Pages

The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT h...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X