Cryptography, Vol. 8, Pages 9: NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V
MDPI » Cryptography
by Hakan Uzuner, Elif Bilge Kavun
2d ago
Cryptography, Vol. 8, Pages 9: NLU-V: A Family of Instruction Set Extensions for Efficient Symmetric Cryptography on RISC-V Cryptography doi: 10.3390/cryptography8010009 Authors: Hakan Uzuner Elif Bilge Kavun Cryptographic primitives nowadays are not only implemented in high-performance systems but also in small-scale systems, which are increasingly powered by open-source processors, such as RISC-V. In this work, we leverage RISC-V’s modular base instruction set and architecture to propose a generic instruction set extension (ISE) for symmetric cryptography. We adapt the work fro ..read more
Visit website
Cryptography, Vol. 8, Pages 8: FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data
MDPI » Cryptography
by Sagarika Behera, Jhansi Rani Prathuri
4d ago
Cryptography, Vol. 8, Pages 8: FPGA-Based Acceleration of K-Nearest Neighbor Algorithm on Fully Homomorphic Encrypted Data Cryptography doi: 10.3390/cryptography8010008 Authors: Sagarika Behera Jhansi Rani Prathuri The suggested solution in this work makes use of the parallel processing capability of FPGA to enhance the efficiency of the K-Nearest Neighbor (KNN) algorithm on encrypted data. The suggested technique was assessed utilizing the breast cancer datasets and the findings indicate that the FPGA-based acceleration method provides significant performance improvements over software implem ..read more
Visit website
Cryptography, Vol. 8, Pages 7: Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
MDPI » Cryptography
by Kyriaki Tsantikidou, Nicolas Sklavos
5d ago
Cryptography, Vol. 8, Pages 7: Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures Cryptography doi: 10.3390/cryptography8010007 Authors: Kyriaki Tsantikidou Nicolas Sklavos Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation systems, and financial institutions, are vital components of a functioning society, with the economy and safety being dependent on them. Nevertheless, they have become increasingly vulnerable to cyber threats and attacks in recent years. The main reason is their inability to quickly adapt to tec ..read more
Visit website
Cryptography, Vol. 8, Pages 6: Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols
MDPI » Cryptography
by Chang Chen, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, Jin Li
3w ago
Cryptography, Vol. 8, Pages 6: Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols Cryptography doi: 10.3390/cryptography8010006 Authors: Chang Chen Guoyu Yang Zhihao Li Fuan Xiao Qi Chen Jin Li Cross-chain transaction technologies have greatly promoted the scalability of cryptocurrencies, which then facilitates the development of Metaverse applications. However, existing solutions rely heavily on centralized middleware (notary) or smart contracts. These schemes lack privacy considerations, and users’ cross-chain transactions are easy to master by other parties. Some ..read more
Visit website
Cryptography, Vol. 8, Pages 5: Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
MDPI » Cryptography
by Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer Zia, Zhen Zhao, Zung Le
1M ago
Cryptography, Vol. 8, Pages 5: Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures Cryptography doi: 10.3390/cryptography8010005 Authors: Yinhao Jiang Mir Ali Rezazadeh Baee Leonie Ruth Simpson Praveen Gauravaram Josef Pieprzyk Tanveer Zia Zhen Zhao Zung Le The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serio ..read more
Visit website
Cryptography, Vol. 8, Pages 3: Novel and Efficient Privacy-Preserving Continuous Authentication
MDPI » Cryptography
by Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang
1M ago
Cryptography, Vol. 8, Pages 3: Novel and Efficient Privacy-Preserving Continuous Authentication Cryptography doi: 10.3390/cryptography8010003 Authors: Ahmed Fraz Baig Sigurd Eskeland Bian Yang Continuous authentication enhances security by re-verifying a user’s validity during the active session. It utilizes data about users’ behavioral actions and contextual information to authenticate them continuously. Such data contain information about user-sensitive attributes such as gender, age, contextual information, and may also provide information about the user&amp ..read more
Visit website
Cryptography, Vol. 8, Pages 4: Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks
MDPI » Cryptography
by Ahmad Mohamad Kabil, Heba Aslan, Marianne Azer
1M ago
Cryptography, Vol. 8, Pages 4: Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks Cryptography doi: 10.3390/cryptography8010004 Authors: Ahmad Mohamad Kabil Heba Aslan Marianne Azer Conditional Privacy Preserving Authentication (CPPA) schemes are an effective way of securing communications in vehicular ad hoc networks (VANETs), as well as ensuring user privacy and accountability. Cryptanalysis plays a crucial role in pointing out the vulnerabilities in existing schemes to enable the development of more resilient ones. In 2019, Zhang propose ..read more
Visit website
Cryptography, Vol. 8, Pages 2: Locking-Enabled Security Analysis of Cryptographic Circuits
MDPI » Cryptography
by Devanshi Upadhyaya, Maël Gay, Ilia Polian
2M ago
Cryptography, Vol. 8, Pages 2: Locking-Enabled Security Analysis of Cryptographic Circuits Cryptography doi: 10.3390/cryptography8010002 Authors: Devanshi Upadhyaya Maël Gay Ilia Polian Hardware implementations of cryptographic primitives require protection against physical attacks and supply chain threats. This raises the question of secure composability of different attack countermeasures, i.e., whether protecting a circuit against one threat can make it more vulnerable against a different threat. In this article, we study the consequences of applying logic locking, a popular design-for-trus ..read more
Visit website
Cryptography, Vol. 8, Pages 1: Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks
MDPI » Cryptography
by Ravikumar Selvam, Akhilesh Tyagi
2M ago
Cryptography, Vol. 8, Pages 1: Residue Number System (RNS) and Power Distribution Network Topology-Based Mitigation of Power Side-Channel Attacks Cryptography doi: 10.3390/cryptography8010001 Authors: Ravikumar Selvam Akhilesh Tyagi Over the past decade, significant research has been performed on power side-channel mitigation techniques. Logic families based on secret sharing schemes, such as t-private logic, that serve to secure cryptographic implementations against power side-channel attacks represent one such countermeasure. These mitigation techniques are applicable at various design abstr ..read more
Visit website
Cryptography, Vol. 7, Pages 64: One-to-Many Simultaneous Secure Quantum Information Transmission
MDPI » Cryptography
by Theodore Andronikos, Alla Sirokofskich
2M ago
Cryptography, Vol. 7, Pages 64: One-to-Many Simultaneous Secure Quantum Information Transmission Cryptography doi: 10.3390/cryptography7040064 Authors: Theodore Andronikos Alla Sirokofskich This paper presents a new quantum protocol designed to transmit information from one source to many recipients simultaneously. The proposed protocol, which is based on the phenomenon of entanglement, is completely distributed and is provably information-theoretically secure. Numerous existing quantum protocols guarantee secure information communication between two parties but are not amenable to generalizat ..read more
Visit website

Follow MDPI » Cryptography on FeedSpot

Continue with Google
Continue with Apple
OR