Interdisciplinary Cryptography

A special issue of Cryptography (ISSN 2410-387X).

Deadline for manuscript submissions: 30 June 2025 | Viewed by 517

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Software Engineering, Miami University, Oxford, OH 45056, USA
Interests: cybersecurity; high-performance computing; Internet of Things
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science and Software Engineering, Miami University, Oxford, OH 45056, USA
Interests: cybersecurity; applied cryptography; quantum computing

Special Issue Information

Dear Colleagues,

These days, a one-way function or a hard mathematical problem is no longer sufficient for designing a cryptosystem. Modern cryptography is supported by several other sciences and technologies, including information theory, artificial intelligence (AI), coding theory, hardware technology, quantum computing, combinatorics, Boolean functions, etc.

We are happy to announce MDPI Cryptography’s new Special Issue entitled “Interdisciplinary Cryptography”. We invite researchers to submit their reviews and novel research papers related to cryptography supported by other sciences and technologies. The scope of the Special Issue includes, but is not limited to, the following topics and areas.

  • Information-theoretic cryptography;
  • AI-assisted cryptography;
  • Hardware-assisted cryptography;
  • Quantum cryptography;
  • Post-quantum Cryptography
  • Code-based cryptography;
  • Combinatorial cryptography;
  • Cryptographic Boolean functions.

Dr. Behrouz Zolfaghari
Dr. Khodakhast Bibak
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Cryptography is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cryptography
  • interdisciplinary cryptography
  • cryptographic functions
  • cryptographic hardware
  • perfectly secure cryptography
  • lattice-based cryptography

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

27 pages, 2477 KiB  
Article
BPAP: FPGA Design of a RISC-like Processor for Elliptic Curve Cryptography Using Task-Level Parallel Programming in High-Level Synthesis
by Rares Ifrim and Decebal Popescu
Cryptography 2025, 9(1), 20; https://doi.org/10.3390/cryptography9010020 - 19 Mar 2025
Viewed by 241
Abstract
Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack. One of the most used systems in this regard is Elliptic Curve Cryptography, precisely the point multiplication operation, [...] Read more.
Popular technologies such as blockchain and zero-knowledge proof, which have already entered the enterprise space, heavily use cryptography as the core of their protocol stack. One of the most used systems in this regard is Elliptic Curve Cryptography, precisely the point multiplication operation, which provides the security assumption for all applications that use this system. As this operation is computationally intensive, one solution is to offload it to specialized accelerators to provide better throughput and increased efficiency. In this paper, we explore the use of Field Programmable Gate Arrays (FPGAs) and the High-Level Synthesis framework of AMD Vitis in designing an elliptic curve point arithmetic unit (point adder) for the secp256k1 curve. We show how task-level parallel programming and data streaming are used in designing a RISC processor-like architecture to provide pipeline parallelism and increase the throughput of the point adder unit. We also show how to efficiently use the proposed processor architecture by designing a point multiplication scheduler capable of scheduling multiple batches of elliptic curve points to utilize the point adder unit efficiently. Finally, we evaluate our design on an AMD-Xilinx Alveo-family FPGA and show that our point arithmetic processor has better throughput and frequency than related work. Full article
(This article belongs to the Special Issue Interdisciplinary Cryptography)
Show Figures

Figure 1

Back to TopTop