Skip Content
You are currently on the new version of our website. Access the old version .

Most Cited

  • Article
  • Open Access
113 Citations
33,303 Views
18 Pages

A Survey of Post-Quantum Cryptography: Start of a New Race

  • Duc-Thuan Dam,
  • Thai-Ha Tran,
  • Van-Phuc Hoang,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computer...

  • Article
  • Open Access
38 Citations
6,863 Views
25 Pages

A Survey of Consortium Blockchain and Its Applications

  • Xiaotong Chen,
  • Songlin He,
  • Linfu Sun,
  • Yangxin Zheng and
  • Chase Q. Wu

Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in a distributed network. While blockchain is well-known for its initial usage in a public manner, such as the cryptocurrency of Bitcoin, cons...

  • Article
  • Open Access
28 Citations
19,316 Views
26 Pages

Applications of Neural Network-Based AI in Cryptography

  • Abderrahmane Nitaj and
  • Tajjeeddine Rachidi

Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, and videos. Other essential t...

  • Article
  • Open Access
26 Citations
4,368 Views
18 Pages

In this work we propose a novel implementation on recent Xilinx FPGA platforms of a PUF architecture based on the NAND SR-latch (referred to as NAND-PUF in the following) which achieves an extremely low resource usage with very good overall performan...

  • Article
  • Open Access
24 Citations
10,473 Views
30 Pages

Random Number Generators: Principles and Applications

  • Anastasios Bikos,
  • Panagiotis E. Nastou,
  • Georgios Petroudis and
  • Yannis C. Stamatiou

In this paper, we present approaches to generating random numbers, along with potential applications. Rather than trying to provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, we focus on so...

  • Article
  • Open Access
22 Citations
9,052 Views
17 Pages

Advances in quantum computers may pose a significant threat to existing public-key encryption methods, which are crucial to the current infrastructure of cyber security. Both RSA and ECDSA, the two most widely used security algorithms today, may be (...

  • Review
  • Open Access
22 Citations
11,564 Views
30 Pages

Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security...

  • Article
  • Open Access
19 Citations
6,125 Views
17 Pages

The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT h...

  • Article
  • Open Access
18 Citations
8,426 Views
38 Pages

The digitization of healthcare data has presented a pressing need to address privacy concerns within the realm of machine learning for healthcare institutions. One promising solution is federated learning, which enables collaborative training of deep...

  • Article
  • Open Access
18 Citations
8,015 Views
24 Pages

Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation systems, and financial institutions, are vital components of a functioning society, with the economy and safety being dependent on them. Nevertheless, they hav...

  • Article
  • Open Access
17 Citations
17,064 Views
18 Pages

The growth of wearable technology has enabled the collection of even more personalized information on individuals. New health-related devices marketed to consumers collect health information that might not fall under the traditional category of Prote...

  • Article
  • Open Access
17 Citations
4,148 Views
20 Pages

A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem

  • Raghunandan Kemmannu Ramesh,
  • Radhakrishna Dodmane,
  • Surendra Shetty,
  • Ganesh Aithal,
  • Monalisa Sahu and
  • Aditya Kumar Sahu

Electronic commerce (E-commerce) transactions require secure communication to protect sensitive information such as credit card numbers, personal identification, and financial data from unauthorized access and fraud. Encryption using public key crypt...

  • Article
  • Open Access
17 Citations
4,149 Views
18 Pages

Boosting Quantum Key Distribution via the End-to-End Loss Control

  • Aleksei D. Kodukhov,
  • Valeria A. Pastushenko,
  • Nikita S. Kirsanov,
  • Dmitry A. Kronberg,
  • Markus Pflitsch and
  • Valerii M. Vinokur

With the rise of quantum technologies, data security increasingly relies on quantum cryptography and its most notable application, quantum key distribution (QKD). Yet, current technological limitations, in particular, the unavailability of quantum re...

  • Article
  • Open Access
16 Citations
3,060 Views
15 Pages

In the realm of smart communication systems, where the ubiquity of 5G/6G networks and IoT applications demands robust data confidentiality, the cryptographic integrity of block and stream cipher mechanisms plays a pivotal role. This paper focuses on...

  • Article
  • Open Access
15 Citations
4,075 Views
22 Pages

Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

  • Mua’ad Abu-Faraj,
  • Abeer Al-Hyari,
  • Charlie Obimbo,
  • Khaled Aldebei,
  • Ismail Altaharwa,
  • Ziad Alqadi and
  • Orabe Almanaseer

This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension privat...

  • Article
  • Open Access
13 Citations
13,479 Views
21 Pages

Blockchain-Based Electronic Voting: A Secure and Transparent Solution

  • Bruno Miguel Batista Pereira,
  • José Manuel Torres,
  • Pedro Miguel Sobral,
  • Rui Silva Moreira,
  • Christophe Pinto de Almeida Soares and
  • Ivo Pereira

Since its appearance in 2008, blockchain technology has found multiple uses in fields such as banking, supply chain management, and healthcare. One of the most intriguing uses of blockchain is in voting systems, where the technology can overcome the...

  • Article
  • Open Access
12 Citations
4,288 Views
17 Pages

Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors

  • Osama A. Khashan,
  • Nour M. Khafajah,
  • Waleed Alomoush,
  • Mohammad Alshinwan,
  • Sultan Alamri,
  • Samer Atawneh and
  • Mutasem K. Alsmadi

Securing multimedia data on disk drives is a major concern because of their rapidly increasing volumes over time, as well as the prevalence of security and privacy problems. Existing cryptographic schemes have high computational costs and slow respon...

  • Article
  • Open Access
12 Citations
4,507 Views
31 Pages

To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The...

  • Article
  • Open Access
12 Citations
14,207 Views
13 Pages

Significant advancements have been achieved in the field of quantum computing in recent years. If somebody ever creates a sufficiently strong quantum computer, many of the public-key cryptosystems in use today might be compromised. Kyber is a post-qu...

  • Article
  • Open Access
12 Citations
8,808 Views
24 Pages

The main purpose of a quantum key distribution network is to provide secret keys to any users or applications requiring a high level of security, ideally such as to offer the best protection against any computational attack, even of a quantum nature....

  • Article
  • Open Access
11 Citations
4,909 Views
28 Pages

The suggested solution in this work makes use of the parallel processing capability of FPGA to enhance the efficiency of the K-Nearest Neighbor (KNN) algorithm on encrypted data. The suggested technique was assessed utilizing the breast cancer datase...

  • Article
  • Open Access
11 Citations
8,258 Views
15 Pages

Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles

  • Dana Sairangazhykyzy Amirkhanova,
  • Maksim Iavich and
  • Orken Mamyrbayev

Modern technologies like quantum and cloud computing have reshaped computing, offering immense power and scalability. While beneficial, they also challenge the security of traditional cryptographic systems. Quantum computing threatens RSA and ECC wit...

  • Article
  • Open Access
10 Citations
4,231 Views
13 Pages

SCANN: Side Channel Analysis of Spiking Neural Networks

  • Karthikeyan Nagarajan,
  • Rupshali Roy,
  • Rasit Onur Topaloglu,
  • Sachhidh Kannan and
  • Swaroop Ghosh

Spiking neural networks (SNNs) are quickly gaining traction as a viable alternative to deep neural networks (DNNs). Compared to DNNs, SNNs are computationally more powerful and energy efficient. The design metrics (synaptic weights, membrane threshol...

  • Article
  • Open Access
10 Citations
7,933 Views
19 Pages

Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities

  • Oleksandr Kuznetsov,
  • Alex Rusnak,
  • Anton Yezhov,
  • Kateryna Kuznetsova,
  • Dzianis Kanonik and
  • Oleksandr Domin

Addressing the critical challenge of ensuring data integrity in decentralized systems, this paper delves into the underexplored area of data falsification probabilities within Merkle Trees, which are pivotal in blockchain and Internet of Things (IoT)...

  • Review
  • Open Access
9 Citations
8,003 Views
16 Pages

With the rise in applications of artificial intelligence (AI) across various sectors, security concerns have become paramount. Traditional AI systems often lack robust security measures, making them vulnerable to adversarial attacks, data breaches, a...

  • Article
  • Open Access
9 Citations
12,166 Views
27 Pages

A Practical Performance Benchmark of Post-Quantum Cryptography Across Heterogeneous Computing Environments

  • Maryam Abbasi,
  • Filipe Cardoso,
  • Paulo Váz,
  • José Silva and
  • Pedro Martins

The emergence of large-scale quantum computing presents an imminent threat to contemporary public-key cryptosystems, with quantum algorithms such as Shor’s algorithm capable of efficiently breaking RSA and elliptic curve cryptography (ECC). Thi...

  • Article
  • Open Access
8 Citations
2,112 Views
17 Pages

Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves

  • Anatoly Bessalov,
  • Volodymyr Sokolov and
  • Serhii Abramov

The article presents the author’s works in the field of modifications and modeling of the Post-Quantum Cryptography (PQC) Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) algorithm on non-cyclic supersingular Edwards curves and its pred...

  • Article
  • Open Access
8 Citations
3,891 Views
20 Pages

Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V

  • Geraldine Shirley Nicholas,
  • Dhruvakumar Vikas Aklekar,
  • Bhavin Thakar and
  • Fareena Saqib

With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, suc...

  • Article
  • Open Access
8 Citations
3,926 Views
18 Pages

Currently, cloud computing has become increasingly popular and thus, many people and institutions choose to put their data into the cloud instead of local environments. Given the massive amount of data and the fidelity of cloud servers, adequate secu...

  • Article
  • Open Access
8 Citations
7,471 Views
21 Pages

RETRACTED: A Publicly Verifiable E-Voting System Based on Biometrics

  • Jinhui Liu,
  • Tianyi Han,
  • Maolin Tan,
  • Bo Tang,
  • Wei Hu and
  • Yong Yu

Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transpar...

  • Article
  • Open Access
7 Citations
5,710 Views
15 Pages

A Decentralized COVID-19 Vaccine Tracking System Using Blockchain Technology

  • Atsuki Koyama,
  • Van Chuong Tran,
  • Manato Fujimoto,
  • Vo Nguyen Quoc Bao and
  • Thi Hong Tran

Coronavirus disease 2019 (COVID-19) vaccines play a crucial role in preventing the spread of the disease. However, the circulation of low-quality and counterfeit vaccines seriously affects human health and the reputation of real vaccine manufacturers...

  • Review
  • Open Access
7 Citations
10,064 Views
16 Pages

Comparative Study of Keccak SHA-3 Implementations

  • Alessandra Dolmeta,
  • Maurizio Martina and
  • Guido Masera

This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologi...

  • Article
  • Open Access
7 Citations
2,582 Views
14 Pages

In the blockchain network, the communication delay between different nodes is a great threat to the distributed ledger consistency of each miner. Blockchain is the core technology of Bitcoin. At present, some research has proven the security of the P...

  • Article
  • Open Access
7 Citations
5,390 Views
22 Pages

Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols

  • Chang Chen,
  • Guoyu Yang,
  • Zhihao Li,
  • Fuan Xiao,
  • Qi Chen and
  • Jin Li

Cross-chain transaction technologies have greatly promoted the scalability of cryptocurrencies, which then facilitates the development of Metaverse applications. However, existing solutions rely heavily on centralized middleware (notary) or smart con...

  • Article
  • Open Access
6 Citations
6,866 Views
13 Pages

Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation

  • Oleksandr Kuznetsov,
  • Alex Rusnak,
  • Anton Yezhov,
  • Dzianis Kanonik,
  • Kateryna Kuznetsova and
  • Oleksandr Domin

Zero-knowledge proofs have emerged as a powerful tool for enhancing privacy and security in blockchain applications. However, the efficiency and scalability of proof systems remain a significant challenge, particularly in the context of Merkle tree i...

  • Article
  • Open Access
6 Citations
4,339 Views
20 Pages

The Security Evaluation of an Efficient Lightweight AES Accelerator

  • Abdullah Aljuffri,
  • Ruoyu Huang,
  • Laura Muntenaar,
  • Georgi Gaydadjiev,
  • Kezheng Ma,
  • Said Hamdioui and
  • Mottaqiallah Taouil

The Advanced Encryption Standard (AES) is widely recognized as a robust cryptographic algorithm utilized to protect data integrity and confidentiality. When it comes to lightweight implementations of the algorithm, the literature mainly emphasizes ar...

  • Article
  • Open Access
6 Citations
5,194 Views
19 Pages

Field-programmable gate arrays (FPGAs) offer the inherent ability to reconfigure at runtime, making them ideal for applications such as data centers, cloud computing, and edge computing. This reconfiguration, often achieved through remote access, ena...

  • Review
  • Open Access
6 Citations
5,176 Views
26 Pages

On Multiple Encryption for Public-Key Cryptography

  • Tudor Soroceanu,
  • Nicolas Buchmann and
  • Marian Margraf

Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due...

  • Article
  • Open Access
6 Citations
3,894 Views
20 Pages

The development of Distributed Ledger Technology (DLT) is pushing toward automating decentralized data exchange processes. One of the key components of this evolutionary step is facilitating smart contracts that, in turn, come with several additional...

  • Article
  • Open Access
6 Citations
4,168 Views
14 Pages

Novel and Efficient Privacy-Preserving Continuous Authentication

  • Ahmed Fraz Baig,
  • Sigurd Eskeland and
  • Bian Yang

Continuous authentication enhances security by re-verifying a user’s validity during the active session. It utilizes data about users’ behavioral actions and contextual information to authenticate them continuously. Such data contain info...

  • Review
  • Open Access
6 Citations
9,801 Views
25 Pages

Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures

  • Yinhao Jiang,
  • Mir Ali Rezazadeh Baee,
  • Leonie Ruth Simpson,
  • Praveen Gauravaram,
  • Josef Pieprzyk,
  • Tanveer Zia,
  • Zhen Zhao and
  • Zung Le

The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasiv...

  • Article
  • Open Access
6 Citations
5,332 Views
13 Pages

Cybersecurity Test Bed for Smart Contracts

  • Casimer DeCusatis,
  • Brian Gormanly,
  • John Iacino,
  • Reed Percelay,
  • Alex Pingue and
  • Justin Valdez

Blockchain, smart contracts, and related concepts have emerged in recent years as a promising technology for cryptocurrency, NFTs, and other areas. However, there are still many security issues that must be addressed as these technologies evolve. Thi...

  • Article
  • Open Access
5 Citations
3,791 Views
17 Pages

While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension...

  • Article
  • Open Access
5 Citations
5,563 Views
14 Pages

Revisiting Multiple Ring Oscillator-Based True Random Generators to Achieve Compact Implementations on FPGAs for Cryptographic Applications

  • Luis Parrilla,
  • Antonio García,
  • Encarnación Castillo,
  • Juan Antonio López-Villanueva and
  • Uwe Meyer-Baese

The generation of random numbers is crucial for practical implementations of cryptographic algorithms. In this sense, hardware security modules (HSMs) include true random number generators (TRNGs) implemented in hardware to achieve good random number...

  • Article
  • Open Access
5 Citations
4,837 Views
18 Pages

A Multi-Party Functional Signatures Scheme for Private Blockchain

  • Quan Zhou,
  • Yulong Zheng,
  • Kaijun Wei,
  • Minhui Chen and
  • Zhikang Zeng

Digital signature technology is essential for ensuring the authenticity and unforgeability of transactions in a private blockchain framework. In some scenarios, transactions require verification from multiple parties, each of whom needs to authentica...

  • Article
  • Open Access
5 Citations
14,329 Views
22 Pages

Attacking Windows Hello for Business: Is It What We Were Promised?

  • Joseph Haddad,
  • Nikolaos Pitropakis,
  • Christos Chrysoulas,
  • Mouad Lemoudden and
  • William J. Buchanan

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to...

  • Article
  • Open Access
5 Citations
2,696 Views
24 Pages

A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids

  • Zahraa Abdullah Ali,
  • Zaid Ameen Abduljabbar,
  • Hamid Ali Abed AL-Asadi,
  • Vincent Omollo Nyangaresi,
  • Iman Qays Abduljaleel and
  • Abdulla J. Y. Aldarwish

Smart grids integrate information technology, decision support systems, communication networks, and sensing technologies. All these components cooperate to facilitate dynamic power adjustments based on received client consumption reports. Although th...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X