Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 6, Issue 2

2022 June - 17 articles

Cover Story: Split manufacturing is a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, its security promise has been challenged by various fab-based attacks which exploit the working principles of design tools. In this work, we formally define the security of split manufacturing and advocate accordingly for a novel, formally secure paradigm. Inspired by the notion of logic locking, we protect designs by embedding secret keys that are completed at the undisclosed back-end-of-line interconnects—the keys become truly indecipherable to fab-based attackers. Our technique is competitive with prior techniques in terms of layout overheads. We also promote an alternative implementation strategy without the need for splitting at all. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (17)

  • Article
  • Open Access
25 Citations
16,108 Views
12 Pages

ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3

  • Ronaldo Serrano,
  • Ckristian Duran,
  • Marco Sarmiento,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advan...

  • Article
  • Open Access
1 Citations
3,828 Views
21 Pages

Probabilistic Logic Models for the Lightning Network

  • Damiano Azzolini and
  • Fabrizio Riguzzi

The Lightning Network (LN) has emerged as one of the prominent solutions to overcome the biggest limit of blockchain based on PoW: scalability. LN allows for creating a layer on top of an existing blockchain where users can send payments and micro-pa...

  • Article
  • Open Access
22 Citations
4,218 Views
27 Pages

Due to great interest in the secure storage and transmission of color images, the necessity for an efficient and robust RGB image encryption technique has grown. RGB image encryption ensures the confidentiality of color images during storage and tran...

  • Review
  • Open Access
7 Citations
6,394 Views
39 Pages

Review of Chosen Isogeny-Based Cryptographic Schemes

  • Bartosz Drzazga and
  • Łukasz Krzywiecki

Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can brea...

  • Article
  • Open Access
4 Citations
3,330 Views
9 Pages

Locating Side Channel Leakage in Time through Matched Filters

  • Alessandro Barenghi,
  • Gioele Falcetti and
  • Gerardo Pelosi

Side channel attacks provide an effective way to extract secret information from the execution of cryptographic algorithms run on a variety of computing devices. One of the crucial steps for a side channel attack to succeed is the capability to locat...

  • Article
  • Open Access
16 Citations
5,856 Views
14 Pages

Low-Cost Area-Efficient FPGA-Based Multi-Functional ECDSA/EdDSA

  • Binh Kieu-Do-Nguyen,
  • Cuong Pham-Quoc,
  • Ngoc-Thinh Tran,
  • Cong-Kha Pham and
  • Trong-Thuc Hoang

In cryptography, elliptic curve cryptography (ECC) is considered an efficient and secure method to implement digital signature algorithms (DSAs). ECC plays an essential role in many security applications, such as transport layer security (TLS), inter...

  • Article
  • Open Access
11 Citations
4,334 Views
15 Pages

Cyber-Phishing Website Detection Using Fuzzy Rule Interpolation

  • Mohammad Almseidin,
  • Mouhammad Alkasassbeh,
  • Maen Alzubi and
  • Jamil Al-Sawwa

This paper introduces a novel detection method for phishing website attacks while avoiding the issues associated with the deficiencies of the knowledge-based representation and the binary decision. The suggested detection method was performed using F...

  • Article
  • Open Access
1 Citations
3,551 Views
16 Pages

Consensus algorithms are the building block of any decentralized network where the risk of malicious users is high. These algorithms are required to be robust, scalable, and secure in order to operate properly. Localized state-change consensus (LSC)...

  • Article
  • Open Access
3 Citations
4,711 Views
22 Pages

A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

  • Abhrajit Sengupta,
  • Mohammed Nabeel,
  • Mohammed Ashraf,
  • Johann Knechtel and
  • Ozgur Sinanoglu

Split manufacturing was introduced as a countermeasure against hardware-level security threats such as IP piracy, overbuilding, and insertion of hardware Trojans. However, the security promise of split manufacturing has been challenged by various att...

  • Article
  • Open Access
2 Citations
3,223 Views
22 Pages

Computational Analysis of Interleaving PN-Sequences with Different Polynomials

  • Sara D. Cardell,
  • Verónica Requena and
  • Amparo Fúster-Sabater

Binary PN-sequences generated by LFSRs exhibit good statistical properties; however, due to their intrinsic linearity, they are not suitable for cryptographic applications. In order to break such a linearity, several approaches can be implemented. Fo...

  • Article
  • Open Access
6 Citations
3,933 Views
14 Pages

Certificate Management Scheme for VANETs Using Blockchain Structure

  • Maharage Nisansala Sevwandi Perera,
  • Toru Nakamura,
  • Masayuki Hashimoto,
  • Hiroyuki Yokoyama,
  • Chen-Mou Cheng and
  • Kouichi Sakurai

Vehicular Ad-hoc NETworks (VANETs), a special kind of Mobile Ad-hoc NETworks (MANETs), play an important role in Intelligent Transportation Systems (ITS). Via wireless technology, vehicles exchange information related to road conditions and their sta...

  • Article
  • Open Access
8 Citations
5,305 Views
17 Pages

A Memory Hierarchy Protected against Side-Channel Attacks

  • Ezinam Bertrand Talaki,
  • Olivier Savry,
  • Mathieu Bouvier Des Noes and
  • David Hely

In the vulnerability analysis of System on Chips, memory hierarchy is considered among the most valuable element to protect against information theft. Many first-order side-channel attacks have been reported on all its components from the main memory...

  • Review
  • Open Access
40 Citations
17,539 Views
52 Pages

The primary purpose of this paper is to bridge the technology gap between Blockchain and Fintech applications. Blockchain technology is already being explored in a wide number of Fintech sectors. After creating a unique taxonomy for Fintech ecosystem...

  • Article
  • Open Access
2 Citations
6,121 Views
18 Pages

Privacy Issues in Stylometric Methods

  • Antonios Patergianakis and
  • Konstantinos Limniotis

Stylometry is a well-known field, aiming to identify the author of a text, based only on the way she/he writes. Despite its obvious advantages in several areas, such as in historical research or for copyright purposes, it may also yield privacy and p...

  • Article
  • Open Access
74 Citations
18,121 Views
16 Pages

Benchmark Analysis of YOLO Performance on Edge Intelligence Devices

  • Haogang Feng,
  • Gaoze Mu,
  • Shida Zhong,
  • Peichang Zhang and
  • Tao Yuan

In the 5G intelligent edge scenario, more and more accelerator-based single-board computers (SBCs) with low power consumption and high performance are being used as edge devices to run the inferencing part of the artificial intelligence (AI) model to...

  • Article
  • Open Access
2 Citations
4,011 Views
18 Pages

The development of increasingly sophisticated quantum computers poses a long-term threat to current cryptographic infrastructure. This has spurred research into both quantum-resistant algorithms and how to safely transition real-world implementations...

  • Article
  • Open Access
4 Citations
3,816 Views
24 Pages

Mobile banking, shopping, and in-app purchases utilize persistent authentication states for access to sensitive data. One-shot authentication permits access for a fixed time period. For instance, a username/password-based authentication allows a user...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X