![MDPI » Cryptography](https://i1.feedspot.com/5411604.jpg?t=1655464374)
MDPI » Cryptography
27 FOLLOWERS
Cryptography is an international, scientific, peer-reviewed, open-access journal of cryptography published quarterly online by MDPI.
MDPI » Cryptography
1w ago
Cryptography, Vol. 8, Pages 32: Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions
Cryptography doi: 10.3390/cryptography8030032
Authors: Jenilee Jao Ian Wilcox Jim Plusquellic Biliana Paskaleva Pavel Bochev
Random variations in microelectronic circuit structures represent the source of entropy for physical unclonable functions (PUFs). In this paper, we investigate delay variations that occur through the routing network and switch matrices of a field-programmable gate array (FPGA). The delay variations are isolated from other components of the programma ..read more
MDPI » Cryptography
2w ago
Cryptography, Vol. 8, Pages 31: Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles
Cryptography doi: 10.3390/cryptography8030031
Authors: Dana Sairangazhykyzy Amirkhanova Maksim Iavich Orken Mamyrbayev
Modern technologies like quantum and cloud computing have reshaped computing, offering immense power and scalability. While beneficial, they also challenge the security of traditional cryptographic systems. Quantum computing threatens RSA and ECC with algorithms like Shor’s algorithm, which can accelerate computations exponentially. This ri ..read more
MDPI » Cryptography
2w ago
Cryptography, Vol. 8, Pages 30: Improve Parallel Resistance of Hashcash Tree
Cryptography doi: 10.3390/cryptography8030030
Authors: Mario Alviano Giada Gabriele
Denial of Service (DoS) attacks remain a persistent threat to online systems, necessitating continual innovation in defense mechanisms. In this work, we present an improved algorithm for mitigating DoS attacks through the augmentation of client puzzle protocols. Building upon the foundation of hashcash trees, a recently proposed data structure combining hashcash and Merkle trees, we introduce a new version of the data structure that en ..read more
MDPI » Cryptography
3w ago
Cryptography, Vol. 8, Pages 29: Public Key Protocols from Twisted-Skew Group Rings
Cryptography doi: 10.3390/cryptography8030029
Authors: Javier de la Cruz Edgar Martínez-Moro Steven Muñoz-Ruiz Ricardo Villanueva-Polanco
This article studies some algebraic structures known as twisted-skew group rings in the context of public key cryptography. We first present some background related to these structures to then specifically introduce particular twisted-skew group rings and show how to utilize them as the underlying algebraic structure to build cryptographic protocols. We closely follow an incre ..read more
MDPI » Cryptography
1M ago
Cryptography, Vol. 8, Pages 27: The Emerging Challenges of Wearable Biometric Cryptosystems
Cryptography doi: 10.3390/cryptography8030027
Authors: Khalid Al Ajlan Tariq Alsboui Omar Alshaikh Isa Inuwa-Dute Saad Khan Simon Parkinson
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and a comprehensive review of recently published literature is necessary to establish emerging challenges. This research a ..read more
MDPI » Cryptography
1M ago
Cryptography, Vol. 8, Pages 26: “Whispers from the Wrist”: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities
Cryptography doi: 10.3390/cryptography8020026
Authors: Asma Sifaoui Matthew S. Eastin
The growth of wearable technology has enabled the collection of even more personalized information on individuals. New health-related devices marketed to consumers collect health information that might not fall under the traditional category of Protected Health Information, and thus, HIPAA protections do not ..read more
MDPI » Cryptography
1M ago
Cryptography, Vol. 8, Pages 24: The Security Evaluation of an Efficient Lightweight AES Accelerator
Cryptography doi: 10.3390/cryptography8020024
Authors: Abdullah Aljuffri Ruoyu Huang Laura Muntenaar Georgi Gaydadjiev Kezheng Ma Said Hamdioui Mottaqiallah Taouil
The Advanced Encryption Standard (AES) is widely recognized as a robust cryptographic algorithm utilized to protect data integrity and confidentiality. When it comes to lightweight implementations of the algorithm, the literature mainly emphasizes area and power optimization, often overlooking considerations related to performance and ..read more
MDPI » Cryptography
1M ago
Cryptography, Vol. 8, Pages 23: Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance
Cryptography doi: 10.3390/cryptography8020023
Authors: Younes Lahraoui Saiida Lazaar Youssef Amal Abderrahmane Nitaj
To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The intricacies of this process can greatly affect the overall security and ef ..read more
MDPI » Cryptography
2M ago
Cryptography, Vol. 8, Pages 22: Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths
Cryptography doi: 10.3390/cryptography8020022
Authors: Gregor Tamati Haywood Saleem Noel Bhatti
As more network communication is encrypted to provide data privacy for users, attackers are focusing their attention on traffic analysis methods for side-channel attacks on user privacy. These attacks exploit patterns in particular features of communication flows such as interpacket timings and packet sizes. Unsupervised machine learning approaches, such as Hidden Markov Mode ..read more
MDPI » Cryptography
2M ago
Cryptography, Vol. 8, Pages 20: A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids
Cryptography doi: 10.3390/cryptography8020020
Authors: Zahraa Abdullah Ali Zaid Ameen Abduljabbar Hamid Ali Abed AL-Asadi Vincent Omollo Nyangaresi Iman Qays Abduljaleel Abdulla J. Y. Aldarwish
Smart grids integrate information technology, decision support systems, communication networks, and sensing technologies. All these components cooperate to facilitate dynamic power adjustments based on received client consumption reports. Although ..read more