Skip Content
You are currently on the new version of our website. Access the old version .

Most Viewed

  • Article
  • Open Access
113 Citations
33,260 Views
18 Pages

A Survey of Post-Quantum Cryptography: Start of a New Race

  • Duc-Thuan Dam,
  • Thai-Ha Tran,
  • Van-Phuc Hoang,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computer...

  • Article
  • Open Access
28 Citations
19,296 Views
26 Pages

Applications of Neural Network-Based AI in Cryptography

  • Abderrahmane Nitaj and
  • Tajjeeddine Rachidi

Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, and videos. Other essential t...

  • Article
  • Open Access
17 Citations
17,028 Views
18 Pages

The growth of wearable technology has enabled the collection of even more personalized information on individuals. New health-related devices marketed to consumers collect health information that might not fall under the traditional category of Prote...

  • Article
  • Open Access
5 Citations
14,307 Views
22 Pages

Attacking Windows Hello for Business: Is It What We Were Promised?

  • Joseph Haddad,
  • Nikolaos Pitropakis,
  • Christos Chrysoulas,
  • Mouad Lemoudden and
  • William J. Buchanan

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to...

  • Article
  • Open Access
12 Citations
14,182 Views
13 Pages

Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised. Kyber is a post-qu...

  • Article
  • Open Access
13 Citations
13,458 Views
21 Pages

Blockchain-Based Electronic Voting: A Secure and Transparent Solution

  • Bruno Miguel Batista Pereira,
  • José Manuel Torres,
  • Pedro Miguel Sobral,
  • Rui Silva Moreira,
  • Christophe Pinto de Almeida Soares and
  • Ivo Pereira

Since its appearance in 2008, blockchain technology has found multiple uses in fields such as banking, supply chain management, and healthcare. One of the most intriguing uses of blockchain is in voting systems, where the technology can overcome the...

  • Article
  • Open Access
9 Citations
12,105 Views
27 Pages

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

  • Maryam Abbasi,
  • Filipe Cardoso,
  • Paulo Váz,
  • José Silva and
  • Pedro Martins

The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). Thi...

  • Review
  • Open Access
22 Citations
11,540 Views
30 Pages

Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security...

  • Article
  • Open Access
23 Citations
10,437 Views
30 Pages

Random Number Generators: Principles and Applications

  • Anastasios Bikos,
  • Panagiotis E. Nastou,
  • Georgios Petroudis and
  • Yannis C. Stamatiou

In this paper, we present approaches to generating random numbers, along with potential applications. Rather than trying to provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, we focus on so...

  • Review
  • Open Access
7 Citations
10,041 Views
16 Pages

Comparative Study of Keccak SHA-3 Implementations

  • Alessandra Dolmeta,
  • Maurizio Martina and
  • Guido Masera

This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologi...

  • Review
  • Open Access
6 Citations
9,772 Views
25 Pages

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures

  • Yinhao Jiang,
  • Mir Ali Rezazadeh Baee,
  • Leonie Ruth Simpson,
  • Praveen Gauravaram,
  • Josef Pieprzyk,
  • Tanveer Zia,
  • Zhen Zhao and
  • Zung Le

The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasiv...

  • Article
  • Open Access
22 Citations
9,030 Views
17 Pages

Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (...

  • Article
  • Open Access
12 Citations
8,793 Views
24 Pages

The main purpose of a quantum key distribution network is to provide secret keys to any users or applications requiring a high level of security, ideally such as to offer the best protection against any computational attack, even of a quantum nature....

  • Article
  • Open Access
18 Citations
8,412 Views
38 Pages

The digitization of healthcare data has presented a pressing need to address privacy concerns within the realm of machine learning for healthcare institutions. One promising solution is federated learning, which enables collaborative training of deep...

  • Article
  • Open Access
11 Citations
8,235 Views
15 Pages

Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles

  • Dana Sairangazhykyzy Amirkhanova,
  • Maksim Iavich and
  • Orken Mamyrbayev

Modern technologies like quantum and cloud computing have reshaped computing, offering immense power and scalability. While beneficial, they also challenge the security of traditional cryptographic systems. Quantum computing threatens RSA and ECC wit...

  • Article
  • Open Access
17 Citations
7,994 Views
24 Pages

Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation systems, and financial institutions, are vital components of a functioning society, with the economy and safety being dependent on them. Nevertheless, they hav...

  • Review
  • Open Access
9 Citations
7,967 Views
16 Pages

With the rise in applications of artificial intelligence (AI) across various sectors, security concerns have become paramount. Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, a...

  • Article
  • Open Access
10 Citations
7,899 Views
19 Pages

Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities

  • Oleksandr Kuznetsov,
  • Alex Rusnak,
  • Anton Yezhov,
  • Kateryna Kuznetsova,
  • Dzianis Kanonik and
  • Oleksandr Domin

Addressing the critical challenge of ensuring data integrity in decentralized systems, this paper delves into the underexplored area of data falsification probabilities within Merkle Trees, which are pivotal in blockchain and Internet of Things (IoT)...

  • Article
  • Open Access
8 Citations
7,460 Views
21 Pages

RETRACTED: A Publicly Verifiable E-Voting System Based on Biometrics

  • Jinhui Liu,
  • Tianyi Han,
  • Maolin Tan,
  • Bo Tang,
  • Wei Hu and
  • Yong Yu

Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transpar...

  • Article
  • Open Access
3 Citations
7,351 Views
29 Pages

Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits...

  • Article
  • Open Access
2 Citations
7,105 Views
21 Pages

Security and Performance Analyses of Post-Quantum Digital Signature Algorithms and Their TLS and PKI Integrations

  • Manohar Raavi,
  • Qaiser Khan,
  • Simeon Wuthier,
  • Pranav Chandramouli,
  • Yaroslav Balytskyi and
  • Sang-Yoon Chang

Quantum computing challenges the mathematical problems anchoring the security of the classical public key algorithms. For quantum-resistant public key algorithms, the National Institute of Standards and Technology (NIST) has undergone a multi-year st...

  • Review
  • Open Access
2 Citations
6,876 Views
21 Pages

Elliptic Curve Cryptography with Machine Learning

  • Jihane Jebrane,
  • Akram Chhaybi,
  • Saiida Lazaar and
  • Abderrahmane Nitaj

Elliptic Curve Cryptography (ECC) is a technology based on the arithmetic of elliptic curves used to build strong and efficient cryptosystems and infrastructures. Several ECC systems, such as the Diffie–Hellman key exchange and the Elliptic Cur...

  • Article
  • Open Access
6 Citations
6,847 Views
13 Pages

Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation

  • Oleksandr Kuznetsov,
  • Alex Rusnak,
  • Anton Yezhov,
  • Dzianis Kanonik,
  • Kateryna Kuznetsova and
  • Oleksandr Domin

Zero-knowledge proofs have emerged as a powerful tool for enhancing privacy and security in blockchain applications. However, the efficiency and scalability of proof systems remain a significant challenge, particularly in the context of Merkle tree i...

  • Article
  • Open Access
38 Citations
6,842 Views
25 Pages

A Survey of Consortium Blockchain and Its Applications

  • Xiaotong Chen,
  • Songlin He,
  • Linfu Sun,
  • Yangxin Zheng and
  • Chase Q. Wu

Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in a distributed network. While blockchain is well-known for its initial usage in a public manner, such as the cryptocurrency of Bitcoin, cons...

  • Article
  • Open Access
2 Citations
6,600 Views
19 Pages

Ring signatures are widely used in e-voting, anonymous whistle-blowing systems, and blockchain transactions. However, due to the anonymity of ring signatures, a signer can sign the same message multiple times, potentially leading to repeated voting o...

  • Article
  • Open Access
19 Citations
6,115 Views
17 Pages

The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT h...

  • Article
  • Open Access
4 Citations
5,932 Views
19 Pages

Matrix Encryption Walks for Lightweight Cryptography

  • Aeryn Dunmore,
  • Juliet Samandari and
  • Julian Jang-Jaccard

In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which op...

  • Article
  • Open Access
4 Citations
5,839 Views
16 Pages

This paper presents a new threshold signature scheme based on Damgaard’s work. The proposed scheme allows for changing the message signature threshold, thereby improving the flexibility of the original Damgaard scheme. This scheme can be applie...

  • Article
  • Open Access
7 Citations
5,705 Views
15 Pages

A Decentralized COVID-19 Vaccine Tracking System Using Blockchain Technology

  • Atsuki Koyama,
  • Van Chuong Tran,
  • Manato Fujimoto,
  • Vo Nguyen Quoc Bao and
  • Thi Hong Tran

Coronavirus disease 2019 (COVID-19) vaccines play a crucial role in preventing the spread of the disease. However, the circulation of low-quality and counterfeit vaccines seriously affects human health and the reputation of real vaccine manufacturers...

  • Article
  • Open Access
5 Citations
5,553 Views
14 Pages

Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications

  • Luis Parrilla,
  • Antonio García,
  • Encarnación Castillo,
  • Juan Antonio López-Villanueva and
  • Uwe Meyer-Baese

The generation of random numbers is crucial for practical implementations of cryptographic algorithms. In this sense, hardware security modules (HSMs) include true random number generators (TRNGs) implemented in hardware to achieve good random number...

  • Article
  • Open Access
3 Citations
5,469 Views
24 Pages

In recent years, with the development of blockchain technology and increased awareness of personal privacy, Self-Sovereign Identity (SSI) has become a hot topic. SSI gives customers more autonomy over their personal information, allowing them to cont...

  • Article
  • Open Access
7 Citations
5,375 Views
22 Pages

Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols

  • Chang Chen,
  • Guoyu Yang,
  • Zhihao Li,
  • Fuan Xiao,
  • Qi Chen and
  • Jin Li

Cross-chain transaction technologies have greatly promoted the scalability of cryptocurrencies, which then facilitates the development of Metaverse applications. However, existing solutions rely heavily on centralized middleware (notary) or smart con...

  • Article
  • Open Access
6 Citations
5,314 Views
13 Pages

Cybersecurity Test Bed for Smart Contracts

  • Casimer DeCusatis,
  • Brian Gormanly,
  • John Iacino,
  • Reed Percelay,
  • Alex Pingue and
  • Justin Valdez

Blockchain, smart contracts, and related concepts have emerged in recent years as a promising technology for cryptocurrency, NFTs, and other areas. However, there are still many security issues that must be addressed as these technologies evolve. Thi...

  • Article
  • Open Access
4 Citations
5,260 Views
12 Pages

The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions. As with many cryptograph...

  • Article
  • Open Access
6 Citations
5,179 Views
19 Pages

Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, ena...

  • Review
  • Open Access
6 Citations
5,167 Views
26 Pages

On Multiple Encryption for Public-Key Cryptography

  • Tudor Soroceanu,
  • Nicolas Buchmann and
  • Marian Margraf

Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due...

  • Article
  • Open Access
11 Citations
4,900 Views
28 Pages

The suggested solution in this work makes use of the parallel processing capability of FPGA to enhance the efficiency of the K-Nearest Neighbor (KNN) algorithm on encrypted data. The suggested technique was assessed utilizing the breast cancer datase...

  • Article
  • Open Access
5 Citations
4,829 Views
18 Pages

A Multi-Party Functional Signatures Scheme for Private Blockchain

  • Quan Zhou,
  • Yulong Zheng,
  • Kaijun Wei,
  • Minhui Chen and
  • Zhikang Zeng

Digital signature technology is essential for ensuring the authenticity and unforgeability of transactions in a private blockchain framework. In some scenarios, transactions require verification from multiple parties, each of whom needs to authentica...

  • Article
  • Open Access
2 Citations
4,784 Views
17 Pages

The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people, objects, and services. However, the current state of the IoT still faces limitations in security....

  • Article
  • Open Access
12 Citations
4,500 Views
31 Pages

To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The...

  • Feature Paper
  • Review
  • Open Access
3 Citations
4,390 Views
37 Pages

Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives

  • Siddhartha Siddhiprada Bhoi,
  • Arathi Arakala,
  • Amy Beth Corman and
  • Asha Rao

Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computa...

  • Article
  • Open Access
26 Citations
4,360 Views
18 Pages

In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which achieves an extremely low resource usage with very good overall performan...

  • Article
  • Open Access
6 Citations
4,324 Views
20 Pages

The Security Evaluation of an Efficient Lightweight AES Accelerator

  • Abdullah Aljuffri,
  • Ruoyu Huang,
  • Laura Muntenaar,
  • Georgi Gaydadjiev,
  • Kezheng Ma,
  • Said Hamdioui and
  • Mottaqiallah Taouil

The Advanced Encryption Standard (AES) is widely recognized as a robust cryptographic algorithm utilized to protect data integrity and confidentiality. When it comes to lightweight implementations of the algorithm, the literature mainly emphasizes ar...

  • Article
  • Open Access
1 Citations
4,297 Views
23 Pages

Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation

  • Mingfei Yu,
  • Dewmini Sudara Marakkalage and
  • Giovanni De Micheli

Garbled circuit (GC) is one of the few promising protocols to realize general-purpose secure computation. The target computation is represented by a Boolean circuit that is subsequently transformed into a network of encrypted tables for execution. Th...

  • Article
  • Open Access
12 Citations
4,278 Views
17 Pages

Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors

  • Osama A. Khashan,
  • Nour M. Khafajah,
  • Waleed Alomoush,
  • Mohammad Alshinwan,
  • Sultan Alamri,
  • Samer Atawneh and
  • Mutasem K. Alsmadi

Securing multimedia data on disk drives is a major concern because of their rapidly increasing volumes over time, as well as the prevalence of security and privacy problems. Existing cryptographic schemes have high computational costs and slow respon...

  • Article
  • Open Access
4 Citations
4,235 Views
31 Pages

The Emerging Challenges of Wearable Biometric Cryptosystems

  • Khalid Al Ajlan,
  • Tariq Alsboui,
  • Omar Alshaikh,
  • Isa Inuwa-Dute,
  • Saad Khan and
  • Simon Parkinson

Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and...

  • Article
  • Open Access
10 Citations
4,225 Views
13 Pages

SCANN: Side Channel Analysis of Spiking Neural Networks

  • Karthikeyan Nagarajan,
  • Rupshali Roy,
  • Rasit Onur Topaloglu,
  • Sachhidh Kannan and
  • Swaroop Ghosh

Spiking neural networks (SNNs) are quickly gaining traction as a viable alternative to deep neural networks (DNNs). Compared to DNNs, SNNs are computationally more powerful and energy efficient. The design metrics (synaptic weights, membrane threshol...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X