Skip to Content
You are currently on the new version of our website. Access the old version .

430 Results Found

  • Article
  • Open Access
8 Citations
2,609 Views
18 Pages

Cryptographic Protocol with Keyless Sensors Authentication for WBAN in Healthcare Applications

  • Kevin Andrae Delgado-Vargas,
  • Gina Gallegos-Garcia and
  • Ponciano Jorge Escamilla-Ambrosio

28 January 2023

Nowadays, technological advances provide people with more facilities and luxuries in life. Medicine is no exception; for example, different wireless sensors can be used to monitor patients’ state of health. These sensors are used in the so-call...

  • Article
  • Open Access
1 Citations
1,926 Views
22 Pages

8 March 2024

This paper presents an innovative entanglement-based protocol to address the Dining Cryptographers problem, utilizing maximally entangled |GHZn tuples as its core. This protocol aims to provide scalability in terms of both the number of crypt...

  • Article
  • Open Access
3 Citations
3,056 Views
12 Pages

21 September 2020

The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research t...

  • Article
  • Open Access
7 Citations
3,839 Views
22 Pages

This paper shows new card-based cryptographic protocols with the minimum number of rounds, using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers to achieve secure mult...

  • Article
  • Open Access
1 Citations
2,754 Views
21 Pages

ICRP: Internet-Friendly Cryptographic Relay-Detection Protocol

  • Ghada Arfaoui,
  • Gildas Avoine,
  • Olivier Gimenez and
  • Jacques Traoré

Traffic hijacking over the Internet has become a frequent incident over the last two decades. From minor inconveniences for casual users to massive leaks of governmental data, these events cover an unprecedently large spectrum. Many hijackings are pr...

  • Proceeding Paper
  • Open Access

Design and Implementation of a UART Module on FPGA Using RTL for Cryptographic Encryption and Decryption Techniques

  • Christian-Antonio Colin-Cejudo,
  • Gonzalo-Issac Duchén-Sánchez and
  • Gabriel Sánchez-Pérez
Eng. Proc.2026, 123(1), 37;https://doi.org/10.3390/engproc2026123037 
(registering DOI)

10 February 2026

The increasing demand for robust and efficient information security has led to the growing adoption of specialized hardware for cryptographic operations. In response to the rise in cyber threats and the need to process large volumes of data in real t...

  • Article
  • Open Access
12 Citations
3,443 Views
19 Pages

29 November 2022

Quantum cryptography protocols make it possible not only to ensure the protection of data transmitted in a communication channel from unauthorized access by intruders, but also to detect the existence of any attempted interception. This scientific di...

  • Article
  • Open Access
4 Citations
2,230 Views
15 Pages

25 May 2022

In existing cryptographic key distribution (CKD) protocols based on computational ghost imaging (CGI), the interaction among multiple legitimate users is generally neglected, and the channel noise has a serious impact on the performance. To overcome...

  • Article
  • Open Access
2,461 Views
24 Pages

17 September 2025

In modern industrial control systems (ICSs), communication protocols such as Modbus TCP remain widely used due to their simplicity, interoperability, and real-time performance. However, these communication protocols (e.g., Modbus TCP) were originally...

  • Article
  • Open Access
5 Citations
4,232 Views
10 Pages

17 April 2018

With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency anal...

  • Review
  • Open Access
10 Citations
11,898 Views
19 Pages

25 March 2024

Electronic voting, based on cryptographic protocols and blockchain technology, represents an advanced method for ensuring the security, transparency, and reliability of electoral processes. The scientific research presented in this article is devoted...

  • Article
  • Open Access
2,258 Views
15 Pages

21 July 2024

Over the years, there has been a significant surge in the popularity of instant messaging applications (IMAs). However, the message notification functionality in IMAs exhibits certain limitations. Some IMAs fail to alert users about new messages afte...

  • Article
  • Open Access
12 Citations
2,631 Views
16 Pages

20 August 2020

In this paper we present a cryptographic primitive based on non-commutative cryptography. This primitive is used for key exchange protocol (KEP) construction. We prove that the security of this primitive relies on a nondeterministic polynomial comple...

  • Article
  • Open Access
2 Citations
1,203 Views
28 Pages

1 March 2025

The incorporation of Internet of Things (IoT) edge nodes into assistive technologies greatly improves the daily lives of individuals with disabilities by facilitating real-time data processing and seamless connectivity. However, the increasing adopti...

  • Article
  • Open Access
1 Citations
1,120 Views
19 Pages

9 June 2024

In today’s TEST interconnected world, the security of 5G Medical IoT networks is of paramount concern. The increasing number of connected devices and the transmission of vast amounts of data necessitate robust measures to protect information in...

  • Article
  • Open Access
1 Citations
725 Views
16 Pages

22 July 2025

Quantum private comparison (QPC) is a quantum cryptographic protocol designed to enable two mutually distrustful parties to securely compare sensitive data without disclosing their private information to each other or any external entities. This stud...

  • Article
  • Open Access
1,055 Views
11 Pages

29 February 2024

Threshold schemes are used among cryptographic techniques for splitting visual data. Such methods allow the generation of a number of secret shares, a certain number of which need to be assembled in order to reconstruct the original image. Traditiona...

  • Article
  • Open Access
12 Citations
2,848 Views
21 Pages

An Authentication Protocol for the Medical Internet of Things

  • Nagwa El-Meniawy,
  • Mohamed R. M. Rizk,
  • Magdy A. Ahmed and
  • Mohamed Saleh

20 July 2022

The progress in biomedical sensors, Internet of Things technologies, big data, cloud computing, and artificial intelligence is leading the development of e-health medical systems, offering a range of new and innovative services. One such service is r...

  • Article
  • Open Access
16 Citations
6,325 Views
23 Pages

7 March 2019

Bluetooth is an important technical standard for short-range and low-power wireless communication. The home automation and entertainment (HAE) systems often make use of Bluetooth technology to link different Bluetooth devices and form Bluetooth netwo...

  • Article
  • Open Access
6 Citations
4,188 Views
14 Pages

Novel and Efficient Privacy-Preserving Continuous Authentication

  • Ahmed Fraz Baig,
  • Sigurd Eskeland and
  • Bian Yang

Continuous authentication enhances security by re-verifying a user’s validity during the active session. It utilizes data about users’ behavioral actions and contextual information to authenticate them continuously. Such data contain info...

  • Article
  • Open Access
6 Citations
3,160 Views
20 Pages

A Secure and Scalable Authentication and Communication Protocol for Smart Grids

  • Muhammad Asfand Hafeez,
  • Kazi Hassan Shakib and
  • Arslan Munir

The growing adoption of smart grid systems presents significant advancements in the efficiency of energy distribution, along with enhanced monitoring and control capabilities. However, the interconnected and distributed nature of these systems also i...

  • Article
  • Open Access
11 Citations
4,053 Views
9 Pages

20 October 2021

We are at the beginning of the age of the Internet of things. Soon, we will be surrounded by smart homes, cities, and infrastructure. To achieve this vision, millions of devices will have to be able to communicate with each other. The demands for com...

  • Article
  • Open Access
16 Citations
5,560 Views
17 Pages

Security Threats and Cryptographic Protocols for Medical Wearables

  • Luis Hernández-Álvarez,
  • Juan José Bullón Pérez,
  • Farrah Kristel Batista and
  • Araceli Queiruga-Dios

10 March 2022

In the past few years, the use of several medical devices is increasing. This paper will pay attention to a device developed to get measures of the temperature of diabetic foot. These wearables usually do not have cryptographic protocols to guarantee...

  • Article
  • Open Access
5 Citations
2,019 Views
23 Pages

25 November 2023

Internet communication is one of the significant aspects of modern civilization. People use banking, health, social, or shopping platforms and send a lot of data. Each communication should be secured and protected against dishonest users’ activ...

  • Review
  • Open Access
7 Citations
2,496 Views
20 Pages

Advancing Compliance with HIPAA and GDPR in Healthcare: A Blockchain-Based Strategy for Secure Data Exchange in Clinical Research Involving Private Health Information

  • Sabri Barbaria,
  • Abderrazak Jemai,
  • Halil İbrahim Ceylan,
  • Raul Ioan Muntean,
  • Ismail Dergaa and
  • Hanene Boussi Rahmouni

15 October 2025

Background: Healthcare data interoperability faces significant barriers, including regulatory compliance complexities, institutional trust deficits, and technical integration challenges. Current centralized architectures demonstrate inadequate mechan...

  • Article
  • Open Access
2 Citations
3,025 Views
15 Pages

Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find t...

  • Article
  • Open Access
722 Views
31 Pages

A Unified Method for Selecting Parameters and Primitive Elements in 2 × 2 Matrix Fields for Cryptographic Protocols

  • Alimzhan Baikenov,
  • Emil Faure,
  • Anatoly Shcherba,
  • Viktor Khaliavka,
  • Sakhybay Tynymbayev and
  • Olga Abramkina

31 July 2025

This paper introduces a novel method for selecting parameters of finite fields formed by 2 × 2 matrices over a finite field of integers modulo a prime p. The method aims to simultaneously determine both the field parameters and primitive elemen...

  • Article
  • Open Access
1 Citations
2,852 Views
27 Pages

During the last few years, smart mobile devices have constituted an indispensable part of our lives, being a main element for many daily activities. However, it is well known that several security and privacy concerns still occur, especially taking i...

  • Article
  • Open Access
14 Citations
10,701 Views
24 Pages

Physical Unclonable Function (PUF)-Based e-Cash Transaction Protocol (PUF-Cash)

  • Jeff Calhoun,
  • Cyrus Minwalla,
  • Charles Helmich,
  • Fareena Saqib,
  • Wenjie Che and
  • Jim Plusquellic

Electronic money (e-money or e-Cash) is the digital representation of physical banknotes augmented by added use cases of online and remote payments. This paper presents a novel, anonymous e-money transaction protocol, built based on physical unclonab...

  • Article
  • Open Access
8 Citations
4,778 Views
23 Pages

24 July 2019

Bluetooth low energy devices are very popular in wireless personal area networks. According to the Bluetooth standard specifications, the low energy secure simple pairing (LESSP) protocol is the process by which the pairing devices negotiate the auth...

  • Article
  • Open Access
6 Citations
3,231 Views
19 Pages

19 November 2019

Research in the area of security for Wireless Sensor Networks over the past two decades has yielded many interesting findings. We focus on the topic of (re-)securing link keys between sensor nodes through so-called secrecy amplification (SA) protocol...

  • Feature Paper
  • Article
  • Open Access
3 Citations
4,055 Views
26 Pages

Multiprotocol Authentication Device for HPC and Cloud Environments Based on Elliptic Curve Cryptography

  • Antonio F. Díaz,
  • Ilia Blokhin,
  • Mancia Anguita,
  • Julio Ortega and
  • Juan J. Escobar

Multifactor authentication is a relevant tool in securing IT infrastructures combining two or more credentials. We can find smartcards and hardware tokens to leverage the authentication process, but they have some limitations. Users connect these dev...

  • Article
  • Open Access
21 Citations
3,337 Views
12 Pages

Public-Key Cryptography Based on Tropical Circular Matrices

  • Huawei Huang,
  • Chunhua Li and
  • Lunzhi Deng

23 July 2022

Some public-key cryptosystems based on the tropical semiring have been proposed in recent years because of their increased efficiency, since the multiplication is actually an ordinary addition of numbers and there is no ordinary multiplication of num...

  • Article
  • Open Access
6 Citations
8,518 Views
17 Pages

Implementation and Performance of Face Recognition Payment System Securely Encrypted by SM4 Algorithm

  • Yukun Zhou,
  • Ningsheng Wu,
  • Baidong Hu,
  • Yitao Zhang,
  • Jingyun Qiu and
  • Weiming Cai

28 June 2022

Face recognition payment is a new type of payment method, with AI face recognition technology as the core, and its speed and convenience are more in line with the users’ payment habits. However, the face is a biological feature with weak privac...

  • Article
  • Open Access
917 Views
27 Pages

Known attacks on the tropical implementation of Stickel protocol involve finding minimal covers for a certain covering problem, and this leads to an exponential growth in the worst case time required to recover the secret key as the used polynomial d...

  • Article
  • Open Access
1,981 Views
42 Pages

DGMT: A Fully Dynamic Group Signature from Symmetric-Key Primitives

  • Mojtaba Fadavi,
  • Sabyasachi Karati,
  • Aylar Erfanian and
  • Reihaneh Safavi-Naini

A group signature scheme allows a user to sign a message anonymously on behalf of a group and provides accountability by using an opening authority who can “open” a signature and reveal the signer’s identity. Group signature schemes...

  • Article
  • Open Access
669 Views
38 Pages

A GHZ-Based Protocol for the Dining Information Brokers Problem

  • Theodore Andronikos,
  • Constantinos Bitsakos,
  • Konstantinos Nikas,
  • Georgios I. Goumas and
  • Nectarios Koziris

6 September 2025

This article introduces the innovative Quantum Dining Information Brokers Problem, presenting a novel entanglement-based quantum protocol to address it. The scenario involves n information brokers, all located in distinct geographical regions, engagi...

  • Article
  • Open Access
8 Citations
4,276 Views
20 Pages

19 October 2018

Oblivious transfer (OT) and bit commitment (BC) are two-party cryptographic protocols which play crucial roles in the construction of various cryptographic protocols. We propose three practical quantum cryptographic protocols in this paper. We first...

  • Article
  • Open Access
1 Citations
2,414 Views
16 Pages

Measurement-Device-Independent Two-Party Cryptography with Error Estimation

  • Zishuai Zhou,
  • Qisheng Guang,
  • Chaohui Gao,
  • Dong Jiang and
  • Lijun Chen

7 November 2020

We present an innovative method for quantum two-party cryptography. Our protocol introduces joint measurement and error estimation to improve the security of two-party cryptographic protocols. Our protocol removes the assumption of the attacker&rsquo...

  • Article
  • Open Access
244 Views
25 Pages

Privacy-Preserving Set Intersection Protocol Based on SM2 Oblivious Transfer

  • Zhibo Guan,
  • Hai Huang,
  • Haibo Yao,
  • Qiong Jia,
  • Kai Cheng,
  • Mengmeng Ge,
  • Bin Yu and
  • Chao Ma

10 January 2026

Private Set Intersection (PSI) is a fundamental cryptographic primitive in privacy-preserving computation and has been widely applied in federated learning, secure data sharing, and privacy-aware data analytics. However, most existing PSI protocols r...

  • Article
  • Open Access
10 Citations
4,859 Views
13 Pages

Adaptable Cryptographic Primitives in Blockchains via Smart Contracts

  • Riccardo Longo,
  • Carla Mascia,
  • Alessio Meneghetti,
  • Giordano Santilli and
  • Giovanni Tognolini

Blockchain-based platforms utilise cryptographic protocols to enforce the correct behaviour of users, as well as to guarantee a sufficient level of protection against malicious adversaries. Cryptography is, however, an ever-evolving discipline, and a...

  • Article
  • Open Access
2 Citations
2,806 Views
11 Pages

Building Group Key Establishment on Group Theory: A Modular Approach

  • Jens-Matthias Bohli,
  • María I. González Vasco and
  • Rainer Steinwandt

30 January 2020

A group key establishment protocol is presented and proven secure in the common reference string mode. The protocol builds on a group-theoretic assumption, and a concrete example can be obtained with a decision Diffie–Hellman assumption. The pr...

  • Abstract
  • Open Access
1 Citations
1,883 Views
1 Page

Traceability of Prêt à Porter Clothing through Cryptographic Protocols

  • Araceli Queiruga-Dios,
  • Juan José Bullón Pérez and
  • Ángel Martín del Rey

In recent years, several methods for monitoring processes and different types of activities have been developed as characteristic of the connected industry and Internet of Things (IoT). [...]

  • Article
  • Open Access
1,885 Views
25 Pages

An Internet Messenger Using Post-Quantum Cryptography Algorithms Based on Isogenies of Elliptic Curves

  • Beniamin Jankowski,
  • Kamil Szydłowski,
  • Marcin Niemiec and
  • Piotr Chołda

This paper presents the design and implementation of an Internet-based instant messaging application that leverages post-quantum cryptographic algorithms founded on isogenies of elliptic curves. The system employs the CSIDH cryptosystem for key excha...

  • Article
  • Open Access
11 Citations
10,657 Views
18 Pages

Processes of gene expression such as regulation of transcription by the general transcription complex can be used to create hard cryptographic protocols which should not be breakable by common cipherattack methodologies. The eukaryotic processes of g...

  • Article
  • Open Access
1 Citations
2,260 Views
18 Pages

Public Key Protocols over Skew Dihedral Group Rings

  • Javier de la Cruz,
  • Edgar Martínez-Moro and
  • Ricardo Villanueva-Polanco

15 September 2022

This paper introduces skew dihedral group rings and their applications for public-key cryptography. We present a specific skew group ring that is the underlying algebraic platform for our cryptographic constructions. We then build a two-party key exc...

  • Article
  • Open Access
1 Citations
3,028 Views
45 Pages

We propose cryptographic rational secret sharing protocols over general networks. In a general network, the dealer may not have direct connections to each player, and players may not have direct connections to each of the other players. We present co...

  • Article
  • Open Access
8 Citations
4,433 Views
28 Pages

14 April 2022

The backbone of the Internet of things (IoT) platform consists of tiny low-cost devices that are continuously exchanging data. These devices are usually limited in terms of hardware footprint, memory capacity, and processing power. The devices are us...

  • Article
  • Open Access
19 Citations
4,252 Views
17 Pages

12 November 2019

Security has become critical for in-vehicle networks as they carry safety-critical data from various components, e.g., sensors or actuators, and current research proposals were quick to react with cryptographic protocols designed for in-vehicle buses...

of 9