Cryptology and Computer Science

A special issue of Signals (ISSN 2624-6120).

Deadline for manuscript submissions: closed (30 November 2021) | Viewed by 3137

Special Issue Editor


E-Mail Website
Guest Editor
Cyber Security Laboratory, Military Communication Institute, 05-130 Zegrze, Poland
Interests: cybersecurity, information assurance; cryptography; computer science; formal methods; entropy; service oriented architectures

Special Issue Information

Dear colleagues,

With the advent of the worldwide web and the emergence of ecommerce applications and social networks, organizations across the world generate a large amount of data daily. Information security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Additionally, network security issues are now becoming important as society is moving toward a digital information age. As more and more users connect to the internet, it attracts a lot of cyber-attacks. It is therefore critical to protect computer and network security. Pernicious hubs are an issue in the system, which can utilize the assets of different hubs and safeguard its own.

This Special Issue on “Cryptology and Computer Science” aims to publish papers that provide new concepts, ideas, insight, and understanding of cryptology and computer science.

Dr. Bartosz Jasiul
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Signals is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cyber security
  • Cryptology
  • Information assurance
  • Computer science

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Other

9 pages, 2447 KiB  
Technical Note
Evaluating the Performance of Lightweight Ciphers in Constrained Environments—The Case of Saturnin
by Panagiotis Podimatas and Konstantinos Limniotis
Signals 2022, 3(1), 86-94; https://doi.org/10.3390/signals3010007 - 16 Feb 2022
Cited by 1 | Viewed by 2687
Abstract
The use of lightweight cryptographic algorithms is essential for addressing security in highly constrained environments such as the Internet of Things. In this paper, the performance of lightweight block ciphers in such highly constrained environments is studied. More precisely, focusing—as a case study—on [...] Read more.
The use of lightweight cryptographic algorithms is essential for addressing security in highly constrained environments such as the Internet of Things. In this paper, the performance of lightweight block ciphers in such highly constrained environments is studied. More precisely, focusing—as a case study—on an important family of lightweight ciphers called “Saturnin”, which has been evaluated as a candidate for standardization in the relative ongoing NIST’s competition, we analyze its efficiency in case that it is implemented in a specific resource-constrained environment. To evaluate the results, a comparative study with the Advanced Encryption Standard (AES) is performed, through an appropriate experimental environment. Our results illustrate that significant gain in performance can be achieved, since Saturnin—whose design is inspired by the design of AES—can be almost two times faster than AES in such restricted environments. Full article
(This article belongs to the Special Issue Cryptology and Computer Science)
Show Figures

Figure 1

Back to TopTop