Skip to Content

236 Results Found

  • Article
  • Open Access
26 Citations
16,403 Views
33 Pages

An Overview of DRAM-Based Security Primitives

  • Nikolaos Athanasios Anagnostopoulos,
  • Stefan Katzenbeisser,
  • John Chandy and
  • Fatemeh Tehranipoor

Recent developments have increased the demand for adequate security solutions, based on primitives that cannot be easily manipulated or altered, such as hardware-based primitives. Security primitives based on Dynamic Random Access Memory (DRAM) can p...

  • Review
  • Open Access
11 Citations
7,894 Views
29 Pages

Flash-Based Security Primitives: Evolution, Challenges and Future Directions

  • Holden Gordon,
  • Jack Edmonds,
  • Soroor Ghandali,
  • Wei Yan,
  • Nima Karimian and
  • Fatemeh Tehranipoor

Over the last two decades, hardware security has gained increasing attention in academia and industry. Flash memory has been given a spotlight in recent years, with the question of whether or not it can prove useful in a security role. Because of inh...

  • Review
  • Open Access
1 Citations
3,718 Views
45 Pages

Building Trust in Autonomous Aerial Systems: A Review of Hardware-Rooted Trust Mechanisms

  • Sagir Muhammad Ahmad,
  • Mohammad Samie and
  • Barmak Honarvar Shakibaei Asli

10 October 2025

Unmanned aerial vehicles (UAVs) are redefining both civilian and defense operations, with swarm-based architectures unlocking unprecedented scalability and autonomy. However, these advancements introduce critical security challenges, particularly in...

  • Article
  • Open Access
5 Citations
4,336 Views
16 Pages

A Morphable Physically Unclonable Function and True Random Number Generator Using a Commercial Magnetic Memory

  • Mohammad Nasim Imtiaz Khan,
  • Chak Yuen Cheng,
  • Sung Hao Lin,
  • Abdullah Ash-Saki and
  • Swaroop Ghosh

We use commercial magnetic memory to realize morphable security primitives, a Physically Unclonable Function (PUF) and a True Random Number Generator (TRNG). The PUF realized by manipulating the write time and the TRNG is realized by tweaking the num...

  • Article
  • Open Access
11 Citations
2,861 Views
20 Pages

30 December 2021

Recently, wireless sensor networks (WSNs) have been widely used in a variety of fields, and make people’s lives more convenient and efficient. However, WSNs are usually deployed in a harsh and insecure environment. Furthermore, sensors with lim...

  • Article
  • Open Access
2,421 Views
19 Pages

Secure Polar Coding for the Primitive Relay Wiretap Channel

  • Manos Athanasakos and
  • George Karagiannidis

9 April 2021

With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristic...

  • Article
  • Open Access
331 Views
29 Pages

Secure and Decentralised Swarm Authentication Using Hardware Security Primitives

  • Sagir Muhammad Ahmad and
  • Barmak Honarvar Shakibaei Asli

Autonomous drone swarms are increasingly deployed in critical domains such as infrastructure inspection, environmental monitoring, and emergency response. While their distributed operation enables scalability and resilience, it also introduces new vu...

  • Article
  • Open Access
8 Citations
4,388 Views
14 Pages

28 August 2021

This paper investigates the usage of logic and logic programming in the design of smart contracts. Our starting point is the logic-based programming language for smart contracts used in a recently proposed framework of quantum-secured blockchain, cal...

  • Article
  • Open Access
9 Citations
7,398 Views
15 Pages

Secure Boot for Reconfigurable Architectures

  • Ali Shuja Siddiqui,
  • Yutian Gui and
  • Fareena Saqib

Reconfigurable computing is becoming ubiquitous in the form of consumer-based Internet of Things (IoT) devices. Reconfigurable computing architectures have found their place in safety-critical infrastructures such as the automotive industry. As the t...

  • Article
  • Open Access
13 Citations
11,099 Views
45 Pages

Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security

  • Nikolaos Athanasios Anagnostopoulos,
  • Tolga Arul,
  • Yufan Fan,
  • Christian Hatzfeld,
  • André Schaller,
  • Wenjie Xiong,
  • Manishkumar Jain,
  • Muhammad Umair Saleem,
  • Jan Lotichius and
  • Stefan Katzenbeisser
  • + 2 authors

Physical Unclonable Functions (PUFs) based on the retention times of the cells of a Dynamic Random Access Memory (DRAM) can be utilised for the implementation of cost-efficient and lightweight cryptographic protocols. However, as recent work has demo...

  • Article
  • Open Access
907 Views
13 Pages

Improving Physically Unclonable Functions’ Performance Using Second-Order Compensated Measurement

  • Jorge Fernández-Aragón,
  • Guillermo Diez-Señorans,
  • Miguel Garcia-Bosque,
  • Raúl Aparicio-Téllez,
  • Gabriel López-Pinar and
  • Santiago Celma

21 February 2025

In this paper, we study the performance of second-order compensated measurement to generate a multi-bit response in physically unclonable functions (PUFs). The proposed technique is based on a novel second-order compensated measurement generating mul...

  • Article
  • Open Access
10 Citations
7,478 Views
23 Pages

Secure and Authenticated Data Communication in Wireless Sensor Networks

  • Omar Alfandi,
  • Arne Bochem,
  • Ansgar Kellner,
  • Christian Göge and
  • Dieter Hogrefe

10 August 2015

Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication...

  • Article
  • Open Access
1 Citations
2,165 Views
19 Pages

10 August 2023

The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure Multi-party Computation has led to an increased demand for a new class of symmetric primitives. Unlike traditional platforms such as servers, microcontrollers, and de...

  • Article
  • Open Access
12 Citations
2,644 Views
16 Pages

20 August 2020

In this paper we present a cryptographic primitive based on non-commutative cryptography. This primitive is used for key exchange protocol (KEP) construction. We prove that the security of this primitive relies on a nondeterministic polynomial comple...

  • Article
  • Open Access
5 Citations
2,175 Views
19 Pages

3 February 2024

The linkable ring signature supporting stealth addresses (SALRS) is a recently proposed cryptographic primitive, which is designed to comprehensively address the soundness and privacy requirements associated with concealing the identities of both the...

  • Review
  • Open Access
24 Citations
5,698 Views
35 Pages

Quantum Oblivious Transfer: A Short Review

  • Manuel B. Santos,
  • Paulo Mateus and
  • Armando N. Pinto

7 July 2022

Quantum cryptography is the field of cryptography that explores the quantum properties of matter. Generally, it aims to develop primitives beyond the reach of classical cryptography and to improve existing classical implementations. Although much of...

  • Article
  • Open Access
94 Citations
8,311 Views
21 Pages

Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography

  • Khwaja Mansoor,
  • Anwar Ghani,
  • Shehzad Ashraf Chaudhry,
  • Shahaboddin Shamshirband,
  • Shahbaz Ahmed Khan Ghayyur and
  • Amir Mosavi

1 November 2019

Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID sy...

  • Article
  • Open Access
10 Citations
3,494 Views
19 Pages

6 September 2023

This paper presents a hardware-assisted security primitive that integrates the Trusted Platform Module (TPM) into IoT devices for authentication in smart grids. Data and device security plays a pivotal role in smart grids since they are vulnerable to...

  • Article
  • Open Access
2 Citations
1,854 Views
13 Pages

Quantum Implementation of AIM: Aiming for Low-Depth

  • Kyungbae Jang,
  • Yujin Oh,
  • Hyunji Kim and
  • Hwajeong Seo

27 March 2024

Security vulnerabilities in the symmetric-key primitives of a cipher can undermine the overall security claims of the cipher. With the rapid advancement of quantum computing in recent years, there is an increasing effort to evaluate the security of s...

  • Article
  • Open Access
8 Citations
7,856 Views
23 Pages

Cryptography with Disposable Backdoors

  • Kai-Min Chung,
  • Marios Georgiou,
  • Ching-Yi Lai and
  • Vassilis Zikas

Backdooring cryptographic algorithms is an indisputable taboo in the cryptographic literature for a good reason: however noble the intentions, backdoors might fall in the wrong hands, in which case security is completely compromised. Nonetheless, mor...

  • Article
  • Open Access
16 Citations
6,701 Views
50 Pages

On the Possibility of Classical Client Blind Quantum Computing

  • Alexandru Cojocaru,
  • Léo Colisson,
  • Elham Kashefi and
  • Petros Wallden

Classical client remote state preparation (CC − RSP) is a primitive where a fully classical party (client) can instruct the preparation of a sequence of random quantum states on some distant party (server) in a way that the description is known to th...

  • Article
  • Open Access
2 Citations
7,199 Views
15 Pages

Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient computing systems. This work presents a summary...

  • Article
  • Open Access
6 Citations
5,054 Views
10 Pages

Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build a secure identity-based signcryption scheme that can be proven secure...

  • Article
  • Open Access
2,513 Views
8 Pages

Molecular-Scale Hardware Encryption Using Tunable Self-Assembled Nanoelectronic Networks

  • Anusha Venkataraman,
  • Eberechukwu Amadi and
  • Chris Papadopoulos

21 June 2022

Nanomaterials are promising alternatives for creating hardware security primitives that are considered more robust and less susceptible to physical attacks compared to standard CMOS-based approaches. Here, nanoscale electronic circuits composed of tu...

  • Article
  • Open Access
17 Citations
6,534 Views
11 Pages

Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation

  • Mariano Lemus,
  • Mariana F. Ramos,
  • Preeti Yadav,
  • Nuno A. Silva,
  • Nelson J. Muga,
  • André Souto,
  • Nikola Paunković,
  • Paulo Mateus and
  • Armando N. Pinto

12 June 2020

The oblivious transfer primitive is sufficient to implement secure multiparty computation. However, secure multiparty computation based on public-key cryptography is limited by the security and efficiency of the oblivious transfer implementation. We...

  • Article
  • Open Access
55 Citations
10,551 Views
26 Pages

7 November 2012

In this paper we describe a security suite for Underwater Acoustic Sensor Networks comprising both fixed and mobile nodes. The security suite is composed of a secure routing protocol and a set of cryptographic primitives aimed at protecting the confi...

  • Article
  • Open Access
2 Citations
2,411 Views
22 Pages

Threshold Multi-Party Private Set Intersection (TMP-PSI) is a cryptographic protocol that enables an element from the receiver’s set to be included in the intersection result if it appears in the sets of at least t1 other participants, w...

  • Article
  • Open Access
6 Citations
3,722 Views
34 Pages

On-Line Evaluation and Monitoring of Security Features of an RO-Based PUF/TRNG for IoT Devices

  • Luis F. Rojas-Muñoz,
  • Santiago Sánchez-Solano,
  • Macarena C. Martínez-Rodríguez and
  • Piedad Brox

18 April 2023

The proliferation of devices for the Internet of Things (IoT) and their implication in many activities of our lives have led to a considerable increase in concern about the security of these devices, posing a double challenge for designers and develo...

  • Article
  • Open Access
3 Citations
3,864 Views
29 Pages

In recent years, several new notions of security have begun receiving consideration for public-key cryptosystems, beyond the standard of security against adaptive chosen ciphertext attack (CCA2). Among these are security against randomness reset atta...

  • Article
  • Open Access
2,803 Views
13 Pages

On Pseudorandomness and Deep Learning: A Case Study

  • Zahra Ebadi Ansaroudi,
  • Rocco Zaccagnino and
  • Paolo D’Arco

6 March 2023

Pseudorandomness is a crucial property that the designers of cryptographic primitives aim to achieve. It is also a key requirement in the calls for proposals of new primitives, as in the case of block ciphers. Therefore, the assessment of the propert...

  • Article
  • Open Access
11 Citations
4,959 Views
17 Pages

23 September 2017

In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth gene...

  • Article
  • Open Access
2 Citations
2,437 Views
22 Pages

Lightweight Mutually Authenticated Key Exchange with Physical Unclonable Functions

  • Cyrus Minwalla,
  • Jim Plusquellic and
  • Eirini Eleni Tsiropoulou

Authenticated key exchange is desired in scenarios where two participants must exchange sensitive information over an untrusted channel but do not trust each other at the outset of the exchange. As a unique hardware-based random oracle, physical uncl...

  • Article
  • Open Access
523 Views
16 Pages

26 November 2025

Physical Unclonable Functions (PUFs) are hardware-based security primitives that can produce unique digital identifiers from electronic devices. They are particularly useful for Internet of Things (IoT) applications due to their low cost and ability...

  • Review
  • Open Access
24 Citations
8,579 Views
50 Pages

A Review of Functional Encryption in IoT Applications

  • Khurram Shahzad,
  • Tanveer Zia and
  • Emad-ul-Haq Qazi

6 October 2022

The Internet of Things (IoT) represents a growing aspect of how entities, including humans and organizations, are likely to connect with others in their public and private interactions. The exponential rise in the number of IoT devices, resulting fro...

  • Article
  • Open Access
1 Citations
2,550 Views
11 Pages

A Security-Mediated Encryption Scheme Based on ElGamal Variant

  • Boon Chian Tea,
  • Muhammad Rezal Kamel Ariffin,
  • Amir Hamzah Abd. Ghafar and
  • Muhammad Asyraf Asbullah

20 October 2021

Boneh et al. introduced mediated RSA (mRSA) in 2001 in an attempt to achieve faster key revocation for medium-sized organizations via the involvement of a security mediator (SEM) as a semi-trusted third party to provide partial ciphertext decryption...

  • Article
  • Open Access
12 Citations
6,868 Views
20 Pages

Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

  • Junghyun Nam,
  • Kim-Kwang Raymond Choo,
  • Sangchul Han,
  • Juryon Paik and
  • Dongho Won

27 January 2015

We present the first provably-secure three-party password-only authenticated key exchange (PAKE) protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol....

  • Article
  • Open Access
24 Citations
8,656 Views
14 Pages

Lightweight S-Box Architecture for Secure Internet of Things

  • A. Prathiba and
  • V. S. Kanchana Bhaaskaran

8 January 2018

Lightweight cryptographic solutions are required to guarantee the security of Internet of Things (IoT) pervasiveness. Cryptographic primitives mandate a non-linear operation. The design of a lightweight, secure, non-linear 4 × 4 substitution box (S-b...

  • Review
  • Open Access
32 Citations
9,037 Views
21 Pages

A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses

  • Hasindu Madushan,
  • Iftekhar Salam and
  • Janaka Alawatugoda

15 December 2022

The security of resource-constrained devices is critical in the IoT field, given that everything is interconnected. Therefore, the National Institute of Standards and Technology (NIST) initialized the lightweight cryptography (LWC) project to standar...

  • Article
  • Open Access
2 Citations
4,009 Views
19 Pages

In recent years, many companies have chosen to outsource data and other data computation tasks to cloud service providers to reduce costs and increase efficiency. However, there are risks of security and privacy breaches when users outsource data to...

  • Article
  • Open Access
21 Citations
6,920 Views
13 Pages

Security is an important aspect of healthcare applications that employ Internet of Things (IoT) technology. More specifically, providing privacy and ensuring the confidentiality, integrity and authenticity of IoT-based designs are crucial in the heal...

  • Article
  • Open Access
7 Citations
5,117 Views
8 Pages

Cryptanalysis of an Authentication Scheme Using an Identity Based Generalized Signcryption

  • Abdul Waheed,
  • Arif Iqbal Umar,
  • Nizamud Din,
  • Noor Ul Amin,
  • Saleem Abdullah and
  • Poom Kumam

24 August 2019

Secure data transmission is a challenging issue in modern data communication. ID based generalized signcryption is a cost effective security primitive which provides authentication or confidentiality, or jointly confidentiality and authentication. We...

  • Review
  • Open Access
1 Citations
1,284 Views
29 Pages

15 November 2024

This paper discusses the foundation of security theory for the Quantum stream cipher based on the Holevo–Yuen theory, which allows the use of “optical amplifiers”. This type of cipher is a technology that provides information-theore...

  • Article
  • Open Access
1 Citations
1,570 Views
25 Pages

11 March 2025

Computing systems grouped in subnets use distributed security models, in general, by creating session keys based on the Diffie–Hellman model, and calculating the necessary parameters for this, on each of the systems. In the particular case of a...

  • Article
  • Open Access
54 Citations
13,012 Views
17 Pages

A Privacy-Preserving, Mutual PUF-Based Authentication Protocol

  • Wenjie Che,
  • Mitchell Martin,
  • Goutham Pocklassery,
  • Venkata K. Kajuluri,
  • Fareena Saqib and
  • Jim Plusquellic

This paper describes an authentication protocol using a Hardware-Embedded Delay PUF called HELP. HELP derives randomness from within-die path delay variations that occur along the paths within a hardware implementation of a cryptographic primitive, s...

  • Article
  • Open Access
1 Citations
3,163 Views
22 Pages

26 February 2021

The ubiquity of smart devices and IoT are the main forces behind the development of cryptographic primitives that preserve the security of this devices, with the resources constraints they face. In this sense, the development of lightweight cryptogra...

  • Article
  • Open Access
6 Citations
5,275 Views
14 Pages

A Zero-Knowledge Proof System with Algebraic Geometry Techniques

  • Edgar González Fernández,
  • Guillermo Morales-Luna and
  • Feliu Sagols

8 January 2020

Current requirements for ensuring data exchange over the internet to fight against security breaches have to consider new cryptographic attacks. The most recent advances in cryptanalysis are boosted by quantum computers, which are able to break commo...

  • Article
  • Open Access
38 Citations
3,497 Views
18 Pages

Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher

  • Parveiz Nazir Lone,
  • Deep Singh,
  • Veronika Stoffová,
  • Deep Chandra Mishra,
  • Umar Hussain Mir and
  • Neerendra Kumar

19 October 2022

In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats. Therefore, efficient cryptosystems are highly necessary for...

  • Article
  • Open Access
4 Citations
4,825 Views
14 Pages

A Lattice-Based Group Authentication Scheme

  • Jheng-Jia Huang,
  • Yi-Fan Tseng,
  • Qi-Liang Yang and
  • Chun-I Fan

15 June 2018

Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quant...

  • Article
  • Open Access
14 Citations
5,149 Views
15 Pages

Design and Analysis of a True Random Number Generator Based on GSR Signals for Body Sensor Networks

  • Carmen Camara,
  • Honorio Martín,
  • Pedro Peris-Lopez and
  • Muawya Aldalaien

30 April 2019

Today, medical equipment or general-purpose devices such as smart-watches or smart-textiles can acquire a person’s vital signs. Regardless of the type of device and its purpose, they are all equipped with one or more sensors and often have wire...

  • Article
  • Open Access
2 Citations
1,975 Views
18 Pages

SM9 Identity-Based Encryption with Designated-Position Fuzzy Equality Test

  • Siyue Dong,
  • Zhen Zhao,
  • Baocang Wang,
  • Wen Gao and
  • Shanshan Zhang

Public key encryption with equality test (PKEET) is a cryptographic primitive that enables a tester to determine whether two ciphertexts encrypted with same or different public keys have been generated from the same message without decryption. Previo...

of 5