Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 1, Issue 3

2017 December - 10 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
2 Citations
9,704 Views
19 Pages

Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim

  • Hae-Duck J. Jeong,
  • WonHwi Ahn,
  • Hyeonggeun Kim and
  • Jong-Suk R. Lee

Internet utilisation has steadily increased, predominantly due to the rapid recent development of information and communication networks and the widespread distribution of smartphones. As a result of this increase in Internet consumption, various typ...

  • Article
  • Open Access
7 Citations
15,136 Views
18 Pages

Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption

  • Anunay Kulshrestha,
  • Akshay Rampuria,
  • Matthew Denton and
  • Ashwin Sreenivas

We introduce a robust framework that allows for cryptographically secure multiparty computations, such as distributed private value auctions. The security is guaranteed by two-sided authentication of all network connections, homomorphically encrypted...

  • Article
  • Open Access
21 Citations
15,586 Views
20 Pages

FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise

  • Chenglu Jin,
  • Charles Herder,
  • Ling Ren,
  • Phuong Ha Nguyen,
  • Benjamin Fuller,
  • Srinivas Devadas and
  • Marten Van Dijk

Herder et al. (IEEE Transactions on Dependable and Secure Computing, 2017) designed a new computational fuzzy extractor and physical unclonable function (PUF) challenge-response protocol based on the Learning Parity with Noise (LPN) problem. The prot...

  • Article
  • Open Access
3 Citations
9,160 Views
23 Pages

Learning Global-Local Distance Metrics for Signature-Based Biometric Cryptosystems

  • George S. Eskander Ekladious,
  • Robert Sabourin and
  • Eric Granger

Biometric traits, such as fingerprints, faces and signatures have been employed in bio-cryptosystems to secure cryptographic keys within digital security schemes. Reliable implementations of these systems employ error correction codes formulated as s...

  • Article
  • Open Access
11 Citations
10,653 Views
18 Pages

Processes of gene expression such as regulation of transcription by the general transcription complex can be used to create hard cryptographic protocols which should not be breakable by common cipherattack methodologies. The eukaryotic processes of g...

  • Article
  • Open Access
5 Citations
9,328 Views
14 Pages

Traditional utility metering is to be replaced by smart metering. Smart metering enables fine-grained utility consumption measurements. These fine-grained measurements raise privacy concerns due to the lifestyle information which can be inferred from...

  • Article
  • Open Access
4 Citations
12,406 Views
17 Pages

Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis. This allows these entities to bypass the usual costs associated with having their own...

  • Article
  • Open Access
20 Citations
10,850 Views
9 Pages

Synchronization in Quantum Key Distribution Systems

  • Anton Pljonkin,
  • Konstantin Rumyantsev and
  • Pradeep Kumar Singh

In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This pap...

  • Article
  • Open Access
5 Citations
9,701 Views
15 Pages

Leveraging Distributions in Physical Unclonable Functions

  • Wenjie Che,
  • Venkata K. Kajuluri,
  • Fareena Saqib and
  • Jim Plusquellic

A special class of Physical Unclonable Functions (PUFs) referred to as strong PUFs can be used in novel hardware-based authentication protocols. Strong PUFs are required for authentication because the bit strings and helper data are transmitted openl...

  • Article
  • Open Access
15 Citations
11,395 Views
22 Pages

A Text-Independent Speaker Authentication System for Mobile Devices

  • Florentin Thullier,
  • Bruno Bouchard and
  • Bob-Antoine J. Menelas

This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To t...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X