Cryptography, Vol. 8, Pages 32: Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions
MDPI » Cryptography
by Jenilee Jao, Ian Wilcox, Jim Plusquellic, Biliana Paskaleva, Pavel Bochev
1w ago
Cryptography, Vol. 8, Pages 32: Entropy Analysis of FPGA Interconnect and Switch Matrices for Physical Unclonable Functions Cryptography doi: 10.3390/cryptography8030032 Authors: Jenilee Jao Ian Wilcox Jim Plusquellic Biliana Paskaleva Pavel Bochev Random variations in microelectronic circuit structures represent the source of entropy for physical unclonable functions (PUFs). In this paper, we investigate delay variations that occur through the routing network and switch matrices of a field-programmable gate array (FPGA). The delay variations are isolated from other components of the programma ..read more
Visit website
Cryptography, Vol. 8, Pages 31: Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles
MDPI » Cryptography
by Dana Sairangazhykyzy Amirkhanova, Maksim Iavich, Orken Mamyrbayev
2w ago
Cryptography, Vol. 8, Pages 31: Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal’s Principles Cryptography doi: 10.3390/cryptography8030031 Authors: Dana Sairangazhykyzy Amirkhanova Maksim Iavich Orken Mamyrbayev Modern technologies like quantum and cloud computing have reshaped computing, offering immense power and scalability. While beneficial, they also challenge the security of traditional cryptographic systems. Quantum computing threatens RSA and ECC with algorithms like Shor’s algorithm, which can accelerate computations exponentially. This ri ..read more
Visit website
Cryptography, Vol. 8, Pages 30: Improve Parallel Resistance of Hashcash Tree
MDPI » Cryptography
by Mario Alviano, Giada Gabriele
2w ago
Cryptography, Vol. 8, Pages 30: Improve Parallel Resistance of Hashcash Tree Cryptography doi: 10.3390/cryptography8030030 Authors: Mario Alviano Giada Gabriele Denial of Service (DoS) attacks remain a persistent threat to online systems, necessitating continual innovation in defense mechanisms. In this work, we present an improved algorithm for mitigating DoS attacks through the augmentation of client puzzle protocols. Building upon the foundation of hashcash trees, a recently proposed data structure combining hashcash and Merkle trees, we introduce a new version of the data structure that en ..read more
Visit website
Cryptography, Vol. 8, Pages 29: Public Key Protocols from Twisted-Skew Group Rings
MDPI » Cryptography
by Javier de la Cruz, Edgar Martínez-Moro, Steven Muñoz-Ruiz, Ricardo Villanueva-Polanco
3w ago
Cryptography, Vol. 8, Pages 29: Public Key Protocols from Twisted-Skew Group Rings Cryptography doi: 10.3390/cryptography8030029 Authors: Javier de la Cruz Edgar Martínez-Moro Steven Muñoz-Ruiz Ricardo Villanueva-Polanco This article studies some algebraic structures known as twisted-skew group rings in the context of public key cryptography. We first present some background related to these structures to then specifically introduce particular twisted-skew group rings and show how to utilize them as the underlying algebraic structure to build cryptographic protocols. We closely follow an incre ..read more
Visit website
Cryptography, Vol. 8, Pages 27: The Emerging Challenges of Wearable Biometric Cryptosystems
MDPI » Cryptography
by Khalid Al Ajlan, Tariq Alsboui, Omar Alshaikh, Isa Inuwa-Dute, Saad Khan, Simon Parkinson
1M ago
Cryptography, Vol. 8, Pages 27: The Emerging Challenges of Wearable Biometric Cryptosystems Cryptography doi: 10.3390/cryptography8030027 Authors: Khalid Al Ajlan Tariq Alsboui Omar Alshaikh Isa Inuwa-Dute Saad Khan Simon Parkinson Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and a comprehensive review of recently published literature is necessary to establish emerging challenges. This research a ..read more
Visit website
Cryptography, Vol. 8, Pages 26: “Whispers from the Wrist”: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities
MDPI » Cryptography
by Asma Sifaoui, Matthew S. Eastin
1M ago
Cryptography, Vol. 8, Pages 26: “Whispers from the Wrist”: Wearable Health Monitoring Devices and Privacy Regulations in the U.S.: The Loopholes, the Challenges, and the Opportunities Cryptography doi: 10.3390/cryptography8020026 Authors: Asma Sifaoui Matthew S. Eastin The growth of wearable technology has enabled the collection of even more personalized information on individuals. New health-related devices marketed to consumers collect health information that might not fall under the traditional category of Protected Health Information, and thus, HIPAA protections do not ..read more
Visit website
Cryptography, Vol. 8, Pages 24: The Security Evaluation of an Efficient Lightweight AES Accelerator
MDPI » Cryptography
by Abdullah Aljuffri, Ruoyu Huang, Laura Muntenaar, Georgi Gaydadjiev, Kezheng Ma, Said Hamdioui, Mottaqiallah Taouil
1M ago
Cryptography, Vol. 8, Pages 24: The Security Evaluation of an Efficient Lightweight AES Accelerator Cryptography doi: 10.3390/cryptography8020024 Authors: Abdullah Aljuffri Ruoyu Huang Laura Muntenaar Georgi Gaydadjiev Kezheng Ma Said Hamdioui Mottaqiallah Taouil The Advanced Encryption Standard (AES) is widely recognized as a robust cryptographic algorithm utilized to protect data integrity and confidentiality. When it comes to lightweight implementations of the algorithm, the literature mainly emphasizes area and power optimization, often overlooking considerations related to performance and ..read more
Visit website
Cryptography, Vol. 8, Pages 23: Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance
MDPI » Cryptography
by Younes Lahraoui, Saiida Lazaar, Youssef Amal, Abderrahmane Nitaj
1M ago
Cryptography, Vol. 8, Pages 23: Securing Data Exchange with Elliptic Curve Cryptography: A Novel Hash-Based Method for Message Mapping and Integrity Assurance Cryptography doi: 10.3390/cryptography8020023 Authors: Younes Lahraoui Saiida Lazaar Youssef Amal Abderrahmane Nitaj To ensure the security of sensitive data, elliptic curve cryptography (ECC) is adopted as an asymmetric method that balances security and efficiency. Nevertheless, embedding messages into elliptic curve (EC) points poses a significant challenge. The intricacies of this process can greatly affect the overall security and ef ..read more
Visit website
Cryptography, Vol. 8, Pages 22: Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths
MDPI » Cryptography
by Gregor Tamati Haywood, Saleem Noel Bhatti
2M ago
Cryptography, Vol. 8, Pages 22: Defence against Side-Channel Attacks for Encrypted Network Communication Using Multiple Paths Cryptography doi: 10.3390/cryptography8020022 Authors: Gregor Tamati Haywood Saleem Noel Bhatti As more network communication is encrypted to provide data privacy for users, attackers are focusing their attention on traffic analysis methods for side-channel attacks on user privacy. These attacks exploit patterns in particular features of communication flows such as interpacket timings and packet sizes. Unsupervised machine learning approaches, such as Hidden Markov Mode ..read more
Visit website
Cryptography, Vol. 8, Pages 20: A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids
MDPI » Cryptography
by Zahraa Abdullah Ali, Zaid Ameen Abduljabbar, Hamid Ali Abed AL-Asadi, Vincent Omollo Nyangaresi, Iman Qays Abduljaleel, Abdulla J. Y. Aldarwish
2M ago
Cryptography, Vol. 8, Pages 20: A Provably Secure Anonymous Authentication Protocol for Consumer and Service Provider Information Transmissions in Smart Grids Cryptography doi: 10.3390/cryptography8020020 Authors: Zahraa Abdullah Ali Zaid Ameen Abduljabbar Hamid Ali Abed AL-Asadi Vincent Omollo Nyangaresi Iman Qays Abduljaleel Abdulla J. Y. Aldarwish Smart grids integrate information technology, decision support systems, communication networks, and sensing technologies. All these components cooperate to facilitate dynamic power adjustments based on received client consumption reports. Although ..read more
Visit website

Follow MDPI » Cryptography on FeedSpot

Continue with Google
Continue with Apple
OR