Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 3, Issue 1

2019 March - 10 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (10)

  • Article
  • Open Access
7 Citations
9,199 Views
25 Pages

Oblivious RAM (ORAM) is a cryptographic primitive which obfuscates the access patterns to a storage, thereby preventing privacy leakage. So far in the current literature, only ‘fully functional’ ORAMs are widely studied which can protect, at a cost o...

  • Article
  • Open Access
2 Citations
6,315 Views
13 Pages

A New Class of Strongly Asymmetric PKA Algorithms: SAA-5

  • Luigi Accardi,
  • Satoshi Iriyama,
  • Koki Jimbo and
  • Massimo Regoli

A new class of public key agreement (PKA) algorithms called strongly-asymmetric algorithms (SAA) was introduced in a previous paper by some of the present authors. This class can be shown to include some of the best-known PKA algorithms, for example...

  • Article
  • Open Access
12 Citations
8,543 Views
11 Pages

Multivariate Public Key Cryptography (MPKC) is one of the main candidates for post-quantum cryptography, especially in the area of signature schemes. In this paper, we instantiate a certificate Identity-Based Signature (IBS) scheme based on Rainbow,...

  • Article
  • Open Access
8 Citations
10,244 Views
22 Pages

An essential requirement of any information management system is to protect data and resources against breach or improper modifications, while at the same time ensuring data access to legitimate users. Systems handling personal data are mandated to t...

  • Article
  • Open Access
37 Citations
8,309 Views
13 Pages

A Novel Algorithm of Constructing Highly Nonlinear S-p-boxes

  • Yasir Naseer,
  • Tariq Shah,
  • Dawood Shah and
  • Sadam Hussain

The role of substitution boxes is very important in block ciphers. Substitution boxes are utilized to create confusion in the cryptosystem. However, to create both confusion and diffusion in any cryptosystem p-boxes and chaos base substitution boxes...

  • Article
  • Open Access
13 Citations
7,926 Views
11 Pages

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

  • Ashutosh Dhar Dwivedi,
  • Shalini Dhar,
  • Gautam Srivastava and
  • Rajani Singh

In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis. We have analyzed Fantomas and Robin with a technique that p...

  • Article
  • Open Access
443 Citations
43,512 Views
16 Pages

Applications of Blockchain Technology in Medicine and Healthcare: Challenges and Future Perspectives

  • Asad Ali Siyal,
  • Aisha Zahid Junejo,
  • Muhammad Zawish,
  • Kainat Ahmed,
  • Aiman Khalil and
  • Georgia Soursou

Blockchain technology has gained considerable attention, with an escalating interest in a plethora of numerous applications, ranging from data management, financial services, cyber security, IoT, and food science to healthcare industry and brain rese...

  • Article
  • Open Access
6 Citations
8,694 Views
12 Pages

SIMON and SPECK families of block ciphers are well-known lightweight ciphers designed by the NSA. In this note, based on the previous investigations on SIMON, a closed formula for the squared correlations and differential probabilities of the mapping...

  • Article
  • Open Access
19 Citations
11,438 Views
25 Pages

New Cryptanalytic Attack on RSA Modulus N = pq Using Small Prime Difference Method

  • Muhammad Rezal Kamel Ariffin,
  • Saidu Isah Abubakar,
  • Faridah Yunos and
  • Muhammad Asyraf Asbullah

This paper presents new short decryption exponent attacks on RSA, which successfully leads to the factorization of RSA modulus N = p q in polynomial time. The paper has two parts. In the first part, we report the usage of the small prime diff...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X