Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 2, Issue 4

2018 December - 16 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (16)

  • Article
  • Open Access
1 Citations
7,963 Views
25 Pages

In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse r...

  • Article
  • Open Access
7,087 Views
16 Pages

Security Incident Information Exchange for Cloud Service Provisioning Chains

  • Christian Frøystad,
  • Inger Anne Tøndel and
  • Martin Gilje Jaatun

Online services are increasingly becoming a composition of different cloud services, making incident-handling difficult, as Cloud Service Providers (CSPs) with end-user customers need information from other providers about incidents that occur at ups...

  • Article
  • Open Access
6,635 Views
12 Pages

Redundancy in Key Management for WSNs

  • Filippo Gandino,
  • Bartolomeo Montrucchio and
  • Maurizio Rebaudengo

Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total num...

  • Article
  • Open Access
22 Citations
12,797 Views
22 Pages

Security and Cryptographic Challenges for Authentication Based on Biometrics Data

  • Stefania Loredana Nita,
  • Marius Iulian Mihailescu and
  • Valentin Corneliu Pau

Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of the society, e.g., Smart City, Internet-of-Things (IoT), Cloud Computing, Big Data. In the near future, biometrics syst...

  • Article
  • Open Access
14 Citations
9,440 Views
20 Pages

Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability&mdas...

  • Article
  • Open Access
1 Citations
6,987 Views
22 Pages

A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online encryption and decryption functionalities...

  • Article
  • Open Access
2 Citations
6,698 Views
15 Pages

In this paper, we gave an attack on RSA (Rivest–Shamir–Adleman) Cryptosystem when φ ( N ) has small multiplicative inverse modulo e and the prime sum p + q is of the form p + q = 2 n k 0 + k 1 , where n is...

  • Article
  • Open Access
9 Citations
7,057 Views
22 Pages

We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic votin...

  • Article
  • Open Access
34 Citations
11,370 Views
12 Pages

The LoRaWAN is one of the new low-power wide-area network (LPWAN) standards applied to Internet of Things (IoT) technology. The key features of LPWAN are its low power consumption and long-range coverage. The LoRaWAN 1.1 specification includes a basi...

  • Article
  • Open Access
5 Citations
9,167 Views
35 Pages

An Identity-based encryption (IBE) simplifies key management by taking users’ identities as public keys. However, how to dynamically revoke users in an IBE scheme is not a trivial problem. To solve this problem, IBE scheme with revocation (name...

  • Article
  • Open Access
1 Citations
7,873 Views
20 Pages

Two of the fastest types of cryptographic algorithms are the stream cipher and the almost-universal hash function. There are secure examples of each that process data in software using less than one CPU cycle per byte. Hashstream combines the two typ...

  • Article
  • Open Access
6 Citations
8,351 Views
16 Pages

A New Technique in Rank Metric Code-Based Encryption

  • Terry Shue Chien Lau and
  • Chik How Tan

We propose a rank metric codes based encryption based on the hard problem of rank syndrome decoding problem. We propose a new encryption with a public key matrix by considering the adding of a random distortion matrix over F q m of full col...

  • Article
  • Open Access
20 Citations
7,420 Views
13 Pages

The design of a practical code-based signature scheme is an open problem in post-quantum cryptography. This paper is the full version of a work appeared at SIN’18 as a short paper, which introduced a simple and efficient one-time secure signatu...

  • Article
  • Open Access
20 Citations
7,960 Views
14 Pages

Pairing Free Identity-Based Blind Signature Scheme with Message Recovery

  • Salome James,
  • N.B. Gayathri and
  • P. Vasudeva Reddy

With the rapid development of modern technology, personal privacy has become a critical concern in many applications. Various digitalized applications such as online voting systems and the electronic cash systems need authenticity and anonymity. Blin...

  • Feature Paper
  • Article
  • Open Access
4 Citations
7,399 Views
19 Pages

A (k, n)-Threshold Progressive Visual Secret Sharing without Expansion

  • Ying-Yu Chen,
  • Bo-Yuan Huang and
  • Justie Su-Tzu Juan

Visual cryptography (VC) encrypts a secret image into n shares (transparency). As such, we cannot see any information from any one share, and the original image is decrypted by stacking all of the shares. The general (k, n)-threshold secret sharing s...

  • Article
  • Open Access
3 Citations
7,224 Views
18 Pages

We present Value Prediction for Security (VPsec), a novel hardware-only framework to counter fault attacks in modern microprocessors, while preserving the performance benefits of Value Prediction (VP.) VP is an elegant and hitherto mature microarchit...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X