Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography, Volume 7, Issue 4

2023 December - 19 articles

Cover Story: Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and doubling operations consist of many modular multiplications of large operands. Accelerating modular multiplication is therefore important for high-performance ECC. This paper presents the hardware implementations of modular multiplication algorithms, including interleaved modular multiplication, Montgomery modular multiplication, shift-sub modular multiplication (SSMM), SSMM with advance preparation, and SSMM with CSAs and sign detection algorithms. We also present the ECC hardware implementations based on the Secp256k1 protocol in affine, projective, and Jacobian coordinates, and evaluate their cost and performance. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (19)

  • Article
  • Open Access
5 Citations
2,585 Views
20 Pages

This paper presents a new quantum protocol designed to transmit information from one source to many recipients simultaneously. The proposed protocol, which is based on the phenomenon of entanglement, is completely distributed and is provably informat...

  • Article
  • Open Access
2 Citations
3,259 Views
24 Pages

We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial...

  • Article
  • Open Access
8 Citations
7,467 Views
21 Pages

RETRACTED: A Publicly Verifiable E-Voting System Based on Biometrics

  • Jinhui Liu,
  • Tianyi Han,
  • Maolin Tan,
  • Bo Tang,
  • Wei Hu and
  • Yong Yu

Voters use traditional paper ballots, a method limited by the factors of time and space, to ensure their voting rights are exercised; this method requires a lot of manpower and resources. Duplicate voting problems may also occur, meaning the transpar...

  • Article
  • Open Access
1 Citations
4,299 Views
23 Pages

Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation

  • Mingfei Yu,
  • Dewmini Sudara Marakkalage and
  • Giovanni De Micheli

Garbled circuit (GC) is one of the few promising protocols to realize general-purpose secure computation. The target computation is represented by a Boolean circuit that is subsequently transformed into a network of encrypted tables for execution. Th...

  • Review
  • Open Access
7 Citations
10,052 Views
16 Pages

Comparative Study of Keccak SHA-3 Implementations

  • Alessandra Dolmeta,
  • Maurizio Martina and
  • Guido Masera

This paper conducts an extensive comparative study of state-of-the-art solutions for implementing the SHA-3 hash function. SHA-3, a pivotal component in modern cryptography, has spawned numerous implementations across diverse platforms and technologi...

  • Article
  • Open Access
2 Citations
3,969 Views
19 Pages

In recent years, many companies have chosen to outsource data and other data computation tasks to cloud service providers to reduce costs and increase efficiency. However, there are risks of security and privacy breaches when users outsource data to...

  • Article
  • Open Access
8 Citations
3,890 Views
20 Pages

Secure Instruction and Data-Level Information Flow Tracking Model for RISC-V

  • Geraldine Shirley Nicholas,
  • Dhruvakumar Vikas Aklekar,
  • Bhavin Thakar and
  • Fareena Saqib

With the proliferation of electronic devices, third-party intellectual property (3PIP) integration in the supply chain of the semiconductor industry and untrusted actors/fields have raised hardware security concerns that enable potential attacks, suc...

  • Article
  • Open Access
3 Citations
7,357 Views
29 Pages

Elliptic curve cryptography (ECC) over prime fields relies on scalar point multiplication realized by point addition and point doubling. Point addition and point doubling operations consist of many modular multiplications of large operands (256 bits...

  • Article
  • Open Access
2 Citations
3,318 Views
23 Pages

In this paper, we introduce secure groups as a cryptographic scheme representing finite groups together with a range of operations, including the group operation, inversion, random sampling, and encoding/decoding maps. We construct secure groups from...

  • Review
  • Open Access
22 Citations
11,548 Views
30 Pages

Field-programmable gate arrays (FPGAs) have firmly established themselves as dynamic platforms for the implementation of physical unclonable functions (PUFs). Their intrinsic reconfigurability and profound implications for enhancing hardware security...

  • Article
  • Open Access
23 Citations
10,454 Views
30 Pages

Random Number Generators: Principles and Applications

  • Anastasios Bikos,
  • Panagiotis E. Nastou,
  • Georgios Petroudis and
  • Yannis C. Stamatiou

In this paper, we present approaches to generating random numbers, along with potential applications. Rather than trying to provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, we focus on so...

  • Article
  • Open Access
12 Citations
8,799 Views
24 Pages

The main purpose of a quantum key distribution network is to provide secret keys to any users or applications requiring a high level of security, ideally such as to offer the best protection against any computational attack, even of a quantum nature....

  • Article
  • Open Access
3 Citations
3,847 Views
20 Pages

SigML++: Supervised Log Anomaly with Probabilistic Polynomial Approximation

  • Devharsh Trivedi,
  • Aymen Boudguiga,
  • Nesrine Kaaniche and
  • Nikos Triandopoulos

Security log collection and storage are essential for organizations worldwide. Log analysis can help recognize probable security breaches and is often required by law. However, many organizations commission log management to Cloud Service Providers (...

  • Article
  • Open Access
3,931 Views
21 Pages

In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption. We prov...

  • Review
  • Open Access
6 Citations
5,171 Views
26 Pages

On Multiple Encryption for Public-Key Cryptography

  • Tudor Soroceanu,
  • Nicolas Buchmann and
  • Marian Margraf

Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due...

  • Article
  • Open Access
18 Citations
8,421 Views
38 Pages

The digitization of healthcare data has presented a pressing need to address privacy concerns within the realm of machine learning for healthcare institutions. One promising solution is federated learning, which enables collaborative training of deep...

  • Article
  • Open Access
1 Citations
2,607 Views
20 Pages

Watermarking is a viable approach for safeguarding the proprietary rights of digital media. This study introduces an innovative fast Fourier transform (FFT)-based phase modulation (PM) scheme that facilitates efficient and effective blind audio water...

  • Article
  • Open Access
19 Citations
6,119 Views
17 Pages

The Number Theoretic Transform (NTT) has been widely used to speed up polynomial multiplication in lattice-based post-quantum algorithms. All NTT operands use modular arithmetic, especially modular multiplication, which significantly influences NTT h...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X