Skip to Content

Most Recent

  • Article
  • Open Access
246 Views
34 Pages

A Robust Image Encryption Framework Using Deep Feature Extraction and AES Key Optimization

  • Sahara A. S. Almola,
  • Hameed A. Younis and
  • Raidah S. Khudeyer

This article presents a novel framework for encrypting color images to enhance digital data security using deep learning and artificial intelligence techniques. The system employs a two-model neural architecture: the first, a Convolutional Neural Net...

  • Article
  • Open Access
257 Views
22 Pages

Deepfake technology can produce highly realistic manipulated media which pose as significant cybersecurity threats, including fraud, misinformation, and privacy violations. This research proposes a deepfake prevention approach based on symmetric and...

  • Article
  • Open Access
246 Views
25 Pages

Strong Non-Transferability from Randomizable Universal Designated Verifier Signatures

  • Magdalena Bertram,
  • Benjamin Zengin,
  • Nicolas Buchmann and
  • Marian Margraf

In the context of digital certification systems, the demand for privacy-preserving authentication is increasingly vital, particularly for critical applications that involve sensitive personal data. Traditional digital signatures provide a robust mean...

  • Article
  • Open Access
610 Views
33 Pages

Communication is defined as the process of transferring data and exchanging information between interconnected systems. Due to the increasing reliance on digital infrastructures by the military, financial, and healthcare sectors, it is important to e...

  • Review
  • Open Access
872 Views
24 Pages

Post-quantum cryptography (PQC) provides the essential cryptographic algorithms needed to secure digital networking systems against future adversaries equipped with quantum computing. This paper reviews the PQC research landscape and identifies open...

  • Review
  • Open Access
394 Views
25 Pages

Post-Quantum PKI: A Survey of Applications and Benchmarking Practices

  • Maya Thabet,
  • Antonia Tsili,
  • Konstantinos Krilakis and
  • Dimitris Syvridis

Post-quantum cryptography (PQC) is, and should be, currently dominating the field of cybersecurity, with many works designing and evaluating the transition of communications security to quantum-safe solutions. As the security level and implementation...

  • Feature Paper
  • Article
  • Open Access
314 Views
22 Pages

Indistinguishability is a fundamental principle of cryptographic security, crucial for securing data transmitted between Internet of Things (IoT) devices. This principle ensures that an attacker cannot distinguish between the encrypted data, also kno...

  • Article
  • Open Access
439 Views
15 Pages

On Tabu Search for Block Cyphers Cryptanalysis

  • Adrian Donatien-Charon,
  • Mijail Borges-Quintana,
  • Miguel A. Borges-Trenard,
  • Omar Rojas and
  • Guillermo Sosa-Gómez

This article presents general methodologies for plaintext attacks on block ciphers using the Tabu Search algorithm. These methods treat the cipher as a black box, with the objective of finding the session key. The primary innovation of our approach i...

  • Article
  • Open Access
476 Views
25 Pages

Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge–Response Authentication

  • Daniel Alarcón-Narváez,
  • Luis Adrián Lizama-Pérez and
  • Fausto Abraham Jacques-García

We present an algebraic framework for constructing challenge–response authentication protocols based on powers of non-diagonalizable matrices over finite fields. The construction relies on upper triangular Toeplitz matrices with a single Jordan...

  • Article
  • Open Access
563 Views
26 Pages

Secure Implementation of RISC-V’s Scalar Cryptography Extension Set

  • Asmaa Kassimi,
  • Abdullah Aljuffri,
  • Christian Larmann,
  • Said Hamdioui and
  • Mottaqiallah Taouil

Instruction Set Architecture (ISA) extensions, particularly scalar cryptography extensions (Zk), combine the performance advantages of hardware with the adaptability of software, enabling the direct and efficient execution of cryptographic functions...

  • Feature Paper
  • Article
  • Open Access
1 Citations
590 Views
19 Pages

Lower Bound on the Overlattice-Based Sieve Algorithm

  • Tongchen Shen,
  • Xiangxue Li and
  • Licheng Wang

Lattice-based cryptography stands as one of the most pivotal candidates in post-quantum cryptography. To configure the parameters of lattice-based cryptographic schemes, a thorough comprehension of their concrete security is indispensable. Lattice si...

  • Article
  • Open Access
859 Views
32 Pages

Unbreakable QR Code Watermarks: A High-Robustness Technique for Digital Image Security Using DWT, SVD, and Schur Factorization

  • Bashar Suhail Khassawneh,
  • Issa AL-Aiash,
  • Mahmoud AlJamal,
  • Omar Aljamal,
  • Latifa Abdullah Almusfar,
  • Bashair Faisal AlThani and
  • Waad Aldossary

In the digital era, protecting the integrity and ownership of digital content is increasingly crucial, particularly against unauthorized copying and tampering. Traditional watermarking techniques often struggle to remain robust under various image ma...

  • Article
  • Open Access
581 Views
18 Pages

Side-channel attacks leveraging microarchitectural components such as caches and translation lookaside buffers (TLBs) pose increasing risks to cryptographic and machine-learning workloads. This paper presents a comparative study of performance and si...

  • Article
  • Open Access
773 Views
14 Pages

AI-Enhanced Perceptual Hashing with Blockchain for Secure and Transparent Digital Copyright Management

  • Zhaoxiong Meng,
  • Rukui Zhang,
  • Bin Cao,
  • Meng Zhang,
  • Yajun Li,
  • Huhu Xue and
  • Meimei Yang

This study presents a novel framework for digital copyright management that integrates AI-enhanced perceptual hashing, blockchain technology, and digital watermarking to address critical challenges in content protection and verification. Traditional...

  • Article
  • Open Access
534 Views
25 Pages

The integration of operational technology (OT) and information technology (IT) within the Industrial Internet of Things (IIoT) has posed prominent security challenges for resource-constrained devices. Existing authentication architectures often suffe...

  • Article
  • Open Access
641 Views
20 Pages

Role-Based Efficient Proactive Secret Sharing with User Revocation

  • Yixuan He,
  • Yuta Kodera,
  • Yasuyuki Nogami and
  • Samsul Huda

Proactive secret sharing (PSS), an extension of secret-sharing schemes, safeguards sensitive data in dynamic distributed networks by periodically refreshing shares to counter adversarial attacks. In our previous work, we constructed a non-interactive...

  • Article
  • Open Access
369 Views
23 Pages

Efficient CCA2-Secure IBKEM from Lattices in the Standard Model

  • Ngoc Ai Van Nguyen,
  • Dung Hoang Duong and
  • Minh Thuy Truc Pham

Recent work at SCN 2020 by Boyen, Izabachène, and Li introduced a lattice-based key-encapsulation mechanism (KEM) that achieves CCA2-security in the standard model without relying on generic transformations. Their proof, however, leaves a few...

  • Article
  • Open Access
1 Citations
1,068 Views
16 Pages

Flexible and Area-Efficient Codesign Implementation of AES on FPGA

  • Oussama Azzouzi,
  • Mohamed Anane,
  • Mohamed Chahine Ghanem,
  • Yassine Himeur and
  • Dominik Wojtczak

As embedded and IoT systems demand secure and compact encryption, developing cryptographic solutions that are both lightweight and efficient remains a major challenge. Many existing AES implementations either lack flexibility or consume excessive har...

  • Article
  • Open Access
2,968 Views
25 Pages

Data security is essential for protecting sensitive information that could compromise both the sender and the receiver. Encryption mechanisms, such as the Advanced Encryption Standard (AES), play a key role in this protection. However, encrypting or...

  • Article
  • Open Access
596 Views
27 Pages

Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access...

  • Article
  • Open Access
683 Views
16 Pages

STAR: Self-Training Assisted Refinement for Side-Channel Analysis on Cryptosystems

  • Yuheng Qian,
  • Jing Gao,
  • Yuhan Qian,
  • Yaoling Ding and
  • An Wang

Reconstructing cryptographic operation sequences through side-channel analysis is essential for recovering private keys, but practical attacks are hindered by unlabeled, noisy, and high-dimensional power traces that challenge accurate classification....

  • Review
  • Open Access
1 Citations
2,152 Views
34 Pages

A Review on Blockchain-Based Trust and Reputation Schemes in Metaverse Environments

  • Firdous Kausar,
  • Hafiz M. Asif,
  • Sajid Hussain and
  • Shahid Mumtaz

The metaverse represents a transformative integration of virtual and physical worlds, offering unprecedented opportunities for social interaction, commerce, education, healthcare, and entertainment. Establishing trust in these expansive and decentral...

  • Article
  • Open Access
1 Citations
3,161 Views
24 Pages

The emergence of quantum computing presents a significant threat to classical cryptographic primitives, particularly those employed in securing internet communications via widely used protocols such as Transport Layer Security (TLS). As conventional...

  • Article
  • Open Access
1,173 Views
30 Pages

As quantum computing continues to advance, it threatens the long-term protection of traditional cryptographic methods, especially in biometric authentication systems where it is important to protect sensitive data. To overcome this challenge, we pres...

  • Article
  • Open Access
489 Views
22 Pages

As electric vehicles (EVs) gain popularity, the existing public charging infrastructure is struggling to keep pace with the rapidly growing demand for the immediate charging needs of EVs. V2V power trading has gradually attracted widespread attention...

  • Article
  • Open Access
1,033 Views
28 Pages

Symmetric cryptography is essential for secure communication as it ensures confidentiality by using shared secret keys. This paper proposes a novel substitution-permutation network (SPN) that integrates Latin squares, permutations, and Reed-Muller (R...

  • Article
  • Open Access
791 Views
23 Pages

A Lightweight Decentralized Medical Data Sharing Scheme with Dual Verification

  • Shaobo Zhang,
  • Yijie Yin,
  • Nangui Chen and
  • Honghui Ning

The rapid growth of smart healthcare improves medical efficiency through electronic data sharing but introduces security risks like privacy leaks and data tampering. However, existing ciphertext-policy attribute-based encryption faces challenges such...

  • Article
  • Open Access
1,438 Views
33 Pages

Enhancing Multi-Factor Authentication with Templateless 2D/3D Biometrics and PUF Integration for Securing Smart Devices

  • Saloni Jain,
  • Amisha Bagri,
  • Maxime Cambou,
  • Dina Ghanai Miandoab and
  • Bertrand Cambou

Secure authentication in smart device ecosystems remains a critical challenge, particularly due to the irrevocability of compromised biometric templates in server-based systems. This paper presents a post-quantum secure multi-factor authentication pr...

  • Article
  • Open Access
1 Citations
2,180 Views
23 Pages

Substitution boxes (S-Boxes) are the core components of modern block ciphers, responsible for introducing the essential nonlinearity that protects against attacks like linear and differential cryptanalysis. For an 8-bit S-Box, the highest possible no...

  • Article
  • Open Access
1 Citations
1,312 Views
28 Pages

Crystals-Kyber and Classic-McEliece are two prominent post-quantum key encapsulation mechanisms (KEMs) designed to address the challenges posed by quantum computing to classical cryptographic schemes. While the former has been standardized by the Nat...

  • Article
  • Open Access
2,132 Views
18 Pages

A Two-Layer Transaction Network-Based Method for Virtual Currency Address Identity Recognition

  • Lingling Xia,
  • Tao Zhu,
  • Zhengjun Jing,
  • Qun Wang,
  • Zhuo Ma,
  • Zimo Huang and
  • Ziyu Yin

Digital currencies, led by Bitcoin and USDT, are characterized by decentralization and anonymity, which obscure the identities of traders and create a conducive environment for illicit activities such as drug trafficking, money laundering, cyber frau...

  • Article
  • Open Access
1 Citations
2,879 Views
20 Pages

Comparative Deep Learning-Based Side-Channel Analysis of an FPGA-Based CRYSTALS-Kyber NTT Accelerator

  • Munkhbaatar Chinbat,
  • Liji Wu,
  • Xiangmin Zhang,
  • Yifan Yang and
  • Man Wei

Deep learning-based side-channel analysis is one of the most effective techniques for extracting and classifying sensitive information from a target device. This paper demonstrates the best-performing deep learning model for the target implementation...

  • Article
  • Open Access
1,470 Views
31 Pages

An Optimized Framework for Detecting Suspicious Accounts in the Ethereum Blockchain Network

  • Noha E. El-Attar,
  • Marwa H. Salama,
  • Mohamed Abdelfattah and
  • Sanaa Taha

Detecting, tracking, and preventing cryptocurrency money laundering within blockchain systems is a major challenge for governments worldwide. This paper presents an anomaly detection model based on blockchain technology and machine learning to identi...

  • Review
  • Open Access
1 Citations
2,777 Views
39 Pages

A Survey of Post-Quantum Oblivious Protocols

  • Altana Khutsaeva,
  • Anton Leevik and
  • Sergey Bezzateev

Modern distributed computing systems and applications with strict privacy requirements demand robust data confidentiality. A primary challenge involves enabling parties to exchange data or perform joint computations. These interactions must avoid rev...

  • Review
  • Open Access
1 Citations
2,793 Views
19 Pages

From Black Boxes to Glass Boxes: Explainable AI for Trustworthy Deepfake Forensics

  • Hanwei Qian,
  • Lingling Xia,
  • Ruihao Ge,
  • Yiming Fan,
  • Qun Wang and
  • Zhengjun Jing

As deepfake technology matures, its risks in spreading false information and threatening personal and societal security are escalating. Despite significant accuracy improvements in existing detection models, their inherent opacity limits their practi...

  • Article
  • Open Access
1,672 Views
42 Pages

Digital contact-tracing (CT) systems differ in how they process risk and expose data, and the centralized–decentralized dichotomy obscures these choices. We propose a modular six-model classification and evaluate 18 platforms across 12 countrie...

  • Article
  • Open Access
1,179 Views
39 Pages

Traceable ring signatures (TRSs) allow a signer to create a signature that maintains anonymity while enabling traceability if needed. It merges the characteristics of traditional ring signatures with the ability to trace signers, making it ideal for...

  • Article
  • Open Access
4 Citations
1,489 Views
16 Pages

Chaotic systems, governed by deterministic nonlinear equations yet exhibiting highly complex and unpredictable behaviors, have emerged as valuable tools at the intersection of mathematics, engineering, and information security. This paper presents a...

  • Article
  • Open Access
1 Citations
1,204 Views
28 Pages

A Face Image Encryption Scheme Based on Nonlinear Dynamics and RNA Cryptography

  • Xiyuan Cheng,
  • Tiancong Cheng,
  • Xinyu Yang,
  • Wenbin Cheng and
  • Yiting Lin

With the rapid development of big data and artificial intelligence, the problem of image privacy leakage has become increasingly prominent, especially for images containing sensitive information such as faces, which poses a higher security risk. In o...

  • Article
  • Open Access
1 Citations
1,121 Views
21 Pages

In several stream cipher designs, Boolean functions (BFs) play a crucial role as non-linear components, either serving as filtering functions or being used within the combining process. The overall strength of stream ciphers mainly depends on certain...

  • Article
  • Open Access
1,107 Views
29 Pages

This paper enhances the multikey scenario in the Gentry–Sahai–Waters (GSW) fully homomorphic encryption scheme to increase its real-world applicability. We integrate the advantages of two existing GSW multikey approaches: one enabling dis...

  • Article
  • Open Access
3 Citations
1,627 Views
25 Pages

This paper presents a comprehensive register transfer-level (RTL) fault injection study targeting the program counter (PC) of the LEON3 processor, a SPARC V8-compliant core widely used in safety-critical and radiation-prone embedded applications. Usi...

  • Article
  • Open Access
1,447 Views
24 Pages

Identity-based cryptography introduced by Shamir (Crypto’84) has seen many advances through the years. In the context of post-quantum identity-based schemes, most of the efficient designs are based on lattices. In this work, we propose an ident...

  • Article
  • Open Access
1 Citations
1,337 Views
24 Pages

Towards Empowering Stakeholders Through Decentralized Trust and Secure Livestock Data Sharing

  • Abdul Ghafoor,
  • Iraklis Symeonidis,
  • Anna Rydberg,
  • Cecilia Lindahl and
  • Abdul Qadus Abbasi

Cybersecurity represents a critical challenge for data-sharing platforms involving multiple stakeholders, particularly within complex and decentralized systems such as livestock supply chain networks. These systems demand novel approaches, robust sec...

  • Article
  • Open Access
1 Citations
1,594 Views
21 Pages

Over years of development in secure multi-party computation (MPC), many sophisticated functionalities have been made practical, and multi-dimensional operations occur more and more frequently in MPC protocols, especially in protocols involving datase...

  • Article
  • Open Access
1,464 Views
31 Pages

Composable Privacy-Preserving Framework for Stakes-Based Online Peer-to-Peer Applications

  • Nikola Hristov-Kalamov,
  • Raúl Fernández-Ruiz,
  • Agustín Álvarez-Marquina,
  • Julio Guillén-García,
  • Roberto Gallardo-Cava and
  • Daniel Palacios-Alonso

As the demand for expansive back-end systems in online applications continues to grow, novel frameworks are necessitated to address the escalating operational demands, energy consumption, and associated costs. Traditional Client–Server models,...

XFacebookLinkedIn
Cryptography - ISSN 2410-387X