You are currently viewing a new version of our website. To view the old version click .

Most Viewed

  • Article
  • Open Access
98 Citations
31,840 Views
18 Pages

A Survey of Post-Quantum Cryptography: Start of a New Race

  • Duc-Thuan Dam,
  • Thai-Ha Tran,
  • Van-Phuc Hoang,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computer...

  • Article
  • Open Access
24 Citations
18,597 Views
26 Pages

Applications of Neural Network-Based AI in Cryptography

  • Abderrahmane Nitaj and
  • Tajjeeddine Rachidi

Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, and videos. Other essential t...

  • Article
  • Open Access
13 Citations
15,495 Views
18 Pages

The growth of wearable technology has enabled the collection of even more personalized information on individuals. New health-related devices marketed to consumers collect health information that might not fall under the traditional category of Prote...

  • Article
  • Open Access
5 Citations
13,894 Views
22 Pages

Attacking Windows Hello for Business: Is It What We Were Promised?

  • Joseph Haddad,
  • Nikolaos Pitropakis,
  • Christos Chrysoulas,
  • Mouad Lemoudden and
  • William J. Buchanan

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to...

  • Article
  • Open Access
8 Citations
13,127 Views
13 Pages

Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised. Kyber is a post-qu...

  • Article
  • Open Access
11 Citations
13,090 Views
21 Pages

Blockchain-Based Electronic Voting: A Secure and Transparent Solution

  • Bruno Miguel Batista Pereira,
  • José Manuel Torres,
  • Pedro Miguel Sobral,
  • Rui Silva Moreira,
  • Christophe Pinto de Almeida Soares and
  • Ivo Pereira

Since its appearance in 2008, blockchain technology has found multiple uses in fields such as banking, supply chain management, and healthcare. One of the most intriguing uses of blockchain is in voting systems, where the technology can overcome the...

  • Review
  • Open Access
20 Citations
10,799 Views
30 Pages

Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security...

  • Article
  • Open Access
8 Citations
10,407 Views
27 Pages

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

  • Maryam Abbasi,
  • Filipe Cardoso,
  • Paulo Váz,
  • José Silva and
  • Pedro Martins

The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). Thi...

  • Article
  • Open Access
19 Citations
9,869 Views
30 Pages

Random Number Generators: Principles and Applications

  • Anastasios Bikos,
  • Panagiotis E. Nastou,
  • Georgios Petroudis and
  • Yannis C. Stamatiou

In this paper, we present approaches to generating random numbers, along with potential applications. Rather than trying to provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, we focus on so...

  • Review
  • Open Access
7 Citations
9,369 Views
16 Pages

Comparative Study of Keccak SHA-3 Implementations

  • Alessandra Dolmeta,
  • Maurizio Martina and
  • Guido Masera

This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologi...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X