This repository was archived by the owner on Jan 11, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 9
Expand file tree
/
Copy pathArxivCryptoGraphy.txt
More file actions
executable file
·2007 lines (2006 loc) · 210 KB
/
ArxivCryptoGraphy.txt
File metadata and controls
executable file
·2007 lines (2006 loc) · 210 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
If there are any errors
please Abort, and run `arxiv_required` for required package installation, and start again
Please wait while we phrase the requested information from global arxiv[arxiv.org] servers
------------>
---------------------------->
------------------------------------------------------>
On a Theorem of Kyureghyan and Pott (Minglong Qi - 5 October, 2018)
Kyureghyan and Alexander Pott (Designs, Codes and Cryptography, 29, 149-164, 2003), the linear feedback polynomials of the Sidel'nikov-Lempel-Cohn-Eastman sequences were determined for some special cases. When referring to that paper, we found that Corollary 4 and Theorem 2 of that paper are wrong because there exist many counterexamples for these two results. In this note, we give some counterexamples of Corollary 4 and Theorem 2 of that paper.
Link: https://arxiv.org/abs/1810.02599
====================================================
Faster individual discrete logarithms in finite fields of composite extension degree (Aurore Guillevic - 17 September, 2018)
Computing discrete logarithms in finite fields is a main concern in cryptography. The best algorithms in large and medium characteristic fields (e.g., {GF}$(p^2)$, {GF}$(p^{12})$) are the Number Field Sieve and its variants (special, high-degree, tower). The best algorithms in small characteristic finite fields (e.g., {GF}$(3^{6 \cdot 509})$) are the Function Field Sieve, Joux's algorithm, and the quasipolynomial-time algorithm
Link: https://arxiv.org/abs/1809.06135
====================================================
Attacks Against BLE Devices by Co-located Mobile Applications (Pallavi Sivakumaran - 11 August, 2018)
Our results indicate that over 60% of these applications do not have mitigation strategies in place in the form of application-layer security, and that cryptography is sometimes implemented incorrectly in those that do
Link: https://arxiv.org/abs/1808.03778
====================================================
A robust image-based cryptology scheme based on cellular non-linear network and local image descriptors (Mohammad Mahdi Dehshibi - 10 August, 2018)
This scheme consists of a cryptography and steganography sub-module in which a 3D CNN is designed to produce a chaotic map as the kernel of the system to preserve confidentiality and data integrity in cryptology. Conducted experiments on 25 standard images prove the effectiveness of the proposed cryptology scheme in terms of security, visual, and complexity analysis.
Link: https://arxiv.org/abs/1808.03702
====================================================
Efficient and Secure Group Key Management in IoT using Multistage Interconnected PUF (Hongxiang Gu - 2 August, 2018)
We show that our design is secure against multiple attack methods and our experimental results show that our design saves 47.33% of energy globally comparing to state-of-the-art Elliptic-curve cryptography (ECC)-based key management scheme on average.
Link: https://arxiv.org/abs/1808.00664
====================================================
Computer-aided proofs for multiparty computation with active security (Helene Haagh - 19 June, 2018)
In the field of cryptography, EasyCrypt is the state of the art proof assistant
Link: https://arxiv.org/abs/1806.07197
====================================================
Systematization of a 256-bit lightweight block cipher Marvin (Sukanya Saha - 19 June, 2018)
The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as well as block ciphers that has been proposed in the recent years. In this paper, we have proposed a new 256 bit lightweight block cipher named as Marvin, that belongs to the family of Extended LS designs.
Link: https://arxiv.org/abs/1806.07051
====================================================
Performance Benchmarking and Optimizing Hyperledger Fabric Blockchain Platform (Parth Thakkar - 29 May, 2018)
We introduced and studied various simple optimizations such as aggressive caching for endorsement policy verification in the cryptography component (3x improvement in the performance) and parallelizing endorsement policy verification (7x improvement). Further, we enhanced and measured the effect of an existing bulk read/write optimization for CouchDB during state validation & commit phase (2.5x improvement). By combining all three optimizations1, we improved the overall throughput by 16x (i.e., from 140 tps to 2250 tps).
Link: https://arxiv.org/abs/1805.11390
====================================================
A fingerprint based crypto-biometric system for secure communication (Rudresh Dwivedi - 22 May, 2018)
To ensure the secure transmission of data, cryptography is treated as the most effective solution. In general, randomly generated cryptographic key (of 256 bits) is difficult to remember
Link: https://arxiv.org/abs/1805.08399
====================================================
IoTSense: Behavioral Fingerprinting of IoT Devices (Bruhadeshwar Bezawada - 11 April, 2018)
However, the computational complexity of cryptographic protocols and/or scalability problems related to key management, render almost all cryptography based authentication protocols impractical for IoT. We validate our approach using five-fold cross validation; we report a identification rate of 86-99% and a mean accuracy of 99%, across all our experiments
Link: https://arxiv.org/abs/1804.03852
====================================================
Two attacks on rank metric code-based schemes: RankSign and an Identity-Based-Encryption scheme (Thomas Debris-Alazard - 7 June, 2018)
RankSign [GRSZ14a] is a code-based signature scheme proposed to the NIST competition for quantum-safe cryptography [AGHRZ17] and, moreover, is a fundamental building block of a new Identity-Based-Encryption (IBE) [GHPT17a]. This signature scheme is based on the rank metric and enjoys remarkably small key sizes, about 10KBytes for an intended level of security of 128 bits
Link: https://arxiv.org/abs/1804.02556
====================================================
A Case Study for Grain Quality Assurance Tracking based on a Blockchain Business Network (Percival Lucena - 21 March, 2018)
Particularly, Blockchain is a new type of distributed database in which transactions are securely appended using cryptography and hashed pointers. Preliminary results support a potential demand for a Blockchain-based certification that would lead to an added valuation of around 15% for GM-free soy in the scope of a Grain Exporter Business Network in Brazil.
Link: https://arxiv.org/abs/1803.07877
====================================================
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling (Thaddeus Dryja - 11 March, 2018)
A series of recent research starting with (Alwen and Serbinenko, STOC 2015) has deepened our understanding of the notion of memory-hardness in cryptography --- a useful property of hash functions for deterring large-scale password-cracking attacks --- and has shown memory-hardness to have intricate connections with the theory of graph pebbling.
Link: https://arxiv.org/abs/1802.07433
====================================================
Attack on the Edon-K Key Encapsulation Mechanism (Matthieu Lequesne - 16 February, 2018)
The key encapsulation mechanism Edon-K was proposed in response to the call for post-quantum cryptography standardization issued by the National Institute of Standards and Technologies (NIST). This scheme is inspired by the McEliece scheme but uses another family of codes defined over $\mathbb{F}_{2^{128}}$ instead of $\mathbb{F}_2$ and is not based on the Hamming metric. We show that the code used in Edon-K is in fact a super-code of a Low Rank Parity Check (LRPC) code of very small rank (1 or 2)
Link: https://arxiv.org/abs/1802.06157
====================================================
Frobenius Additive Fast Fourier Transform (Wen-Ding Li - 12 February, 2018)
Termed the Frobenius FFT, this discovery has a profound impact on polynomial multiplication, especially for multiplying binary polynomials, which finds ample application in coding theory and cryptography. Furthermore, we demonstrate the power of Frobenius additive FFT for q=2: to multiply two binary polynomials whose product is of degree <256, the new technique requires only 29,005 bit operations, while the best result previously reported was 33,397
Link: https://arxiv.org/abs/1802.03932
====================================================
A New Algorithm for Double Scalar Multiplication over Koblitz Curves (J. Adikari - 25 January, 2018)
Koblitz curves are a special set of elliptic curves and have improved performance in computing scalar multiplication in elliptic curve cryptography due to the Frobenius endomorphism. We achieve 12% improvement in speed against state-of-the-art $Ï$-adic joint sparse form.
Link: https://arxiv.org/abs/1801.08589
====================================================
On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields (Danilo Gligoroski - 20 January, 2018)
Orthogonal and quasi-orthogonal matrices have a long history of use in digital image processing, digital and wireless communications, cryptography and many other areas of computer science and coding theory. We call the matrices quasi-binary due to the fact that matrices have only two elements $a, b \in \mathbb{F}_q$, but those elements are not $0$ and $1$. We give a simple relation between the values $a, b, c$ and $d$ for any finite field and especially for finite fields with characteristic 2
Link: https://arxiv.org/abs/1801.06736
====================================================
The New Threats of Information Hiding: the Road Ahead (K. Cabaj - 2 January, 2018)
Compared to cryptography, steganography is a less discussed domain. Differently from other works, this paper solely focuses on real-world threats observed in the 2011 - 2017 timeframe
Link: https://arxiv.org/abs/1801.00694
====================================================
A Provably Secure Ring Signature Scheme in Certificateless Cryptography (Lei Zhang - 25 December, 2017)
Certificateless public key cryptography was first introduced by Al-Riyami and Paterson in Asiacrypt 2003
Link: https://arxiv.org/abs/1712.09145
====================================================
Dimension of nonbinary antiprimitive BCH codes (Ruihu Li - 19 December, 2017)
Bose-Chaudhuri-Hocquenghem (BCH) codes have been widely employed in satellite communications, compact disc players, DVDs, disk drives, solid-state drives, two-dimensional bar codes and in cryptography more recently. In this paper, dimension of a special class of nonprimitive BCH codes of length $n=q^{m}+1$ ( which are also called antiprimitive BCH codes) are studied. Some new approaches, such as iterative algorithm, partition and scaling, are adopted to determine the first several largest coset leaders modulo $n=q^{2t+1}+1$ along with coset leaders of $C_{x}$ modulo $n=q^{m}+1$ for $q^{\lceil \frac{m}{2}\rceil}<x<2(q^{\lceil \frac{m}{2} \rceil}+q)$
Link: https://arxiv.org/abs/1712.06842
====================================================
Key management system for WSNs based on hash functions and elliptic curve cryptography (Hamzeh Ghasemzadeh - 22 November, 2017)
Recently, an energy efficient method based on public key cryptography (PKC) was proposed. We show that the improved protocol achieves immediate authentication at the expense of 1.82 mj extra energy consumption while retaining other desirable characteristics of the basic method.
Link: https://arxiv.org/abs/1711.08570
====================================================
On error linear complexity of new generalized cyclotomic binary sequences of period $p^2$ (Chenhuang Wu - 22 April, 2018)
Xiao et al., who calculated the linear complexity of the sequences (Designs, Codes and Cryptography, 2017, https://doi.org/10.1007/s10623-017-0408-7). More exactly, we determine the values of $k$-error linear complexity over $\mathbb{F}_2$ for almost $k>0$ in terms of the theory of Fermat quotients
Link: https://arxiv.org/abs/1711.06063
====================================================
Cryptanalysis of Merkle-Hellman cipher using parallel genetic algorithm (Nedjmeeddine Kantour - 13 November, 2017)
In 1976, Whitfield Diffie and Martin Hellman introduced the public key cryptography or asymmetric cryptography standards
Link: https://arxiv.org/abs/1711.04642
====================================================
Attacks on the Search-RLWE problem with small errors (Hao Chen - 10 October, 2017)
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and homomorphic encryption. In particular, we identify a "subfield vulnerability" (Section 5.2) and give a new attack which finds this vulnerability by mapping to a finite field extension and detecting non-uniformity with respect to the number of elements in the subfield
Link: https://arxiv.org/abs/1710.03739
====================================================
Characterizations of o-polynomials by the Walsh transform (Claude Carlet - 12 September, 2017)
In 2011 and later, it has been shown that those objects play an important role in symmetric cryptography and coding theory to design bent Boolean functions, bent vectorial Boolean functions, semi-bent functions and to construct good linear codes
Link: https://arxiv.org/abs/1709.03765
====================================================
Crowdsourcing Predictors of Residential Electric Energy Usage (Mark D. Wagy - 8 September, 2017)
Crowdsourcing has been successfully applied in many domains including astronomy, cryptography and biology. To implement this concept, we deployed a web-based system within which 627 residential electricity customers posed 632 questions that they thought predictive of energy usage
Link: https://arxiv.org/abs/1709.02739
====================================================
The Linear Complexity of a Class of Binary Sequences With Optimal Autocorrelation (Cuiling Fan - 1 January, 2018)
Binary sequences with optimal autocorrelation and large linear complexity have important applications in cryptography and communications. Codes Cryptogr., DOI 10.1007/s10623-017-0398-5), where $p$ is an odd prime with $p\equiv 1(\bmod~4)$
Link: https://arxiv.org/abs/1708.05480
====================================================
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography (Adebayo Omotosho - 26 July, 2017)
Thus, this paper presents the development of privacy and security system for cryptography-based-EHR by taking advantage of the uniqueness of fingerprint and iris characteristic features to secure cryptographic keys in a bio-cryptography framework. Both the fuzzy vault and fuzzy commitment demonstrated false acceptance rate (FAR) of 0%, which reduces the likelihood of imposters gaining successful access to the keys protecting patients protected health information
Link: https://arxiv.org/abs/1708.01643
====================================================
New Constructions of Permutation Polynomials of the Form $x^rh\left(x^{q-1}\right)$ over $\mathbb{F}_{q^2}$ (Kangquan Li - 3 August, 2017)
Permutation polynomials over finite fields have been studied extensively recently due to their wide applications in cryptography, coding theory, communication theory, among others. Recently, several authors have studied permutation trinomials of the form $x^rh\left(x^{q-1}\right)$ over $\mathbb{F}_{q^2}$, where $q=2^k$, $h(x)=1+x^s+x^t$ and $r, s, t, k>0$ are integers. Moreover, we can explain most of the known permutation trinomials, which are in [6, 13, 14, 16, 20, 29], over finite field with even characteristic.
Link: https://arxiv.org/abs/1708.01165
====================================================
Advances in Security in Computing and Communications (Jaydip Sen - 29 July, 2017)
This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications
Link: https://arxiv.org/abs/1707.09526
====================================================
Modification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice (Dewi Sartika Ginting - 11 July, 2017)
Classical cryptography is a way of disguising the news done by the people when there was no computer. And the final digit of the digit shown in the form of binary digits so that 5 characters can be changed to 80 digit bits are scrambled
Link: https://arxiv.org/abs/1707.03319
====================================================
An optimization technique on pseudorandom generators based on chaotic iterations (Jacques M. Bahi - 27 June, 2017)
Internet communication systems involving cryptography and data hiding often require billions of random numbers. Pursuing recent researches published in the previous International Conference on Evolving Internet (Internet 09, 10, and 11), three methods to build pseudorandom generators by using chaotic iterations are recalled
Link: https://arxiv.org/abs/1706.08773
====================================================
New Optimal Binary Sequences with Period $4p$ via Interleaving Ding-Helleseth-Lam Sequences (Wei Su - 26 May, 2017)
Binary sequences with optimal autocorrelation play important roles in radar, communication, and cryptography. Ding-Helleseth-Lam sequences are such a class of binary sequences of period $p$, where $p$ is an odd prime with $p\equiv 1(\bmod~4)$
Link: https://arxiv.org/abs/1705.09623
====================================================
New quaternary sequences of even length with optimal auto-correlation (W Su - 15 May, 2017)
Sequences with low auto-correlation property have been applied in code-division multiple access communication systems, radar and cryptography. In this paper, using interleaving method, we present several classes of component sequences from twin-prime sequences pairs or GMW sequences pairs given by Tang and Ding in 2010; two, three or four binary sequences defined by cyclotomic classes of order $4$
Link: https://arxiv.org/abs/1705.05509
====================================================
Flipping out with many flips: hardness of testing k-monotonicity (Elena Grigorescu - 3 June, 2018)
Such functions represent a natural generalization of (1-)monotone functions, and have been recently studied in circuit complexity, PAC learning, and cryptography. (ITCS 2017) initiate the study of k-monotone functions in the area of property testing, and Newman et al. (SODA 2017) study testability of families characterized by freeness from order patterns on real-valued functions over the line [n] domain. (JCSS, 72(6), 2006)
Link: https://arxiv.org/abs/1705.04205
====================================================
Binary Prime Tableau Sequences (Prashanth Busireddygari - 16 April, 2017)
This paper proposes a new class of random sequences called binary primes tableau (PT) sequences that have potential applications in cryptography and communications. The PT sequence of rank p is obtained from numbers arranged in a tableau with p columns where primes are marked off until each column has at least one prime and where the column entries are added modulo 2
Link: https://arxiv.org/abs/1704.08718
====================================================
A new class of three-weight linear codes from weakly regular plateaued functions (Sihem Mesnager - 24 March, 2017)
To do this, we generalize the recent contribution of Mesnager given in [Cryptography and Communications 9(1), 71-84, 2017]
Link: https://arxiv.org/abs/1703.08362
====================================================
Information Theory of Data Privacy (Genqiang Wu - 25 February, 2018)
By combining Shannon's cryptography model with an assumption to the lower bound of adversaries' uncertainty to the queried dataset, we develop a secure Bayesian inference-based privacy model and then in some extent answer Dwork et al.'s question [1]: "why Bayesian risk factors are the right measure for privacy loss".
Link: https://arxiv.org/abs/1703.07474
====================================================
Quantum Information Set Decoding Algorithms (Ghazal Kachigar - 22 April, 2017)
This research thread started in Overbeck and Sendrier's 2009 survey on code-based cryptography, and the best algorithm to date has been Bernstein's quantising of the simplest information set decoding algorithm, namely Prange's algorithm
Link: https://arxiv.org/abs/1703.00263
====================================================
Accurate Measurement of Power Consumption Overhead During FPGA Dynamic Partial Reconfiguration (Amor Nafkha - 30 January, 2017)
Today, several application, e.g., cryptography, Software-defined radio or aerospace missions exploit the benefits of DPR of programmable logic devices. Results in terms of reconfiguration time and power consumption overhead for Virtex 5 FPGAs are shown.
Link: https://arxiv.org/abs/1701.08849
====================================================
Generalized Hamming weights of three classes of linear codes (Gaopeng Jian - 12 February, 2017)
The generalized Hamming weights of a linear code have been extensively studied since Wei first use them to characterize the cryptography performance of a linear code over the wire-tap channel of type II. Theory 61(9): 4905--4913, 2015).
Link: https://arxiv.org/abs/1612.09390
====================================================
PrivLogit: Efficient Privacy-preserving Logistic Regression by Tailoring Numerical Optimizers (Wei Xie - 3 November, 2016)
Privacy-preserving distributed machine learning (based on cryptography) is popular to solve the problem. Extensive theoretical and empirical evaluations prove the competitive performance of our two secure proposals while without compromising accuracy or privacy: with speedup up to 2.3x and 8.1x, respectively, over state-of-the-art; and even faster as data scales up. Such drastic speedup is on top of and in addition to performance improvements from existing (and future) state-of-the-art cryptography
Link: https://arxiv.org/abs/1611.01170
====================================================
Elliptic-Curves Cryptography on High-Dimensional Surfaces (Alberto Sonnino - 13 September, 2016)
We discuss the use of elliptic curves in cryptography on high-dimensional surfaces. In particular, instead of a Diffie-Hellman key exchange protocol written in the form of a bi-dimensional row, where the elements are made up with 256 bits, we propose a key exchange protocol given in a matrix form, with four independent entries each of them constructed with 64 bits
Link: https://arxiv.org/abs/1610.01518
====================================================
On the cryptanalysis of Fridrich's chaotic image encryption scheme (Eric Yong Xie - 10 October, 2016)
In 1989, Fridrich's chaotic image encryption scheme was designed by iterating chaotic position permutation and value substitution some rounds, which received intensive attention in the field of chaos-based cryptography. In 2010, Solak \textit{et al.} proposed a chosen-ciphertext attack on the Fridrich's scheme utilizing influence network between cipher-pixels and the corresponding plain-pixels
Link: https://arxiv.org/abs/1609.05352
====================================================
Quantum one-way permutation over the finite field of two elements (Alexandre de Castro - 27 April, 2017)
In quantum cryptography, a one-way permutation is a bounded unitary operator $U:\mathcal{H} \to \mathcal{H}$ on a Hilbert space $\mathcal{H}$ that is easy to compute on every input, but hard to invert given the image of a random input. 39 (1): 92-103 (2003)] has conjectured that the unitary transformation $g(a,x)=(a,f(x)+ax)$, where $f$ is any length-preserving function and $a,x \in GF_{{2}^{\|x\|}}$, is an information-theoretically secure operator within a polynomial factor
Link: https://arxiv.org/abs/1609.01541
====================================================
The Status of Polycyclic Group-Based Cryptography: A Survey and Open Problems (Jonathan Gryak - 21 October, 2016)
These properties make them suitable for use in group-based cryptography, which was proposed in 2004 by Eick and Kahrobaei
Link: https://arxiv.org/abs/1607.05819
====================================================
Several Classes of Negabent Functions over Finite Fields (Gaofei Wu - 29 June, 2016)
Negabent functions as a class of generalized bent functions have attracted a lot of attention recently due to their applications in cryptography and coding theory. First, by using the compositional inverses of certain binomial and trinomial permutations, we present several classes of negabent functions of the form $f(x)=\Tr_1^n(λx^{2^k+1})+\Tr_1^n(ux)\Tr_1^n(vx)$, where $λ\in \F_{2^n}$, $2\leq k\leq n-1$, $(u,v)\in \F^*_{2^n}\times \F^*_{2^n}$, and $\Tr_1^n(\cdot)$ is the trace function from $\F_{2^n}$ to $\F_{2}$
Link: https://arxiv.org/abs/1606.08952
====================================================
RankSign: an efficient signature algorithm based on the rank metric (Philippe Gaborit - 26 May, 2017)
In that case the difficult problem becomes, as is the case in lattice-based cryptography, finding a preimage of weight above the Gilbert-Varshamov bound (case where many solutions occur) rather than finding a unique preimage of weight below the Gilbert-Varshamov bound. Finally, we give several examples of parameters for our scheme, some of which with public key of size $11,520$ bits and signature of size $1728$ bits
Link: https://arxiv.org/abs/1606.00629
====================================================
Solving discrete logarithms on a 170-bit MNT curve by pairing reduction (Aurore Guillevic - 24 November, 2016)
Pairing based cryptography is in a dangerous position following the breakthroughs on discrete logarithms computations in finite fields of small characteristic. The aim of our work is to sustain the claim that the combination of degree 3 embedding and too small finite fields obviously does not provide enough security
Link: https://arxiv.org/abs/1605.07746
====================================================
$μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers (Joost Renes - 20 April, 2016)
Our results are the first to show the feasibility of software-only hyperelliptic cryptography on constrained platforms, and represent a significant improvement on the elliptic-curve state-of-the-art for both key exchange and signatures on these architectures
Link: https://arxiv.org/abs/1604.06059
====================================================
Cryptompress: A Symmetric Cryptography algorithm to deny Bruteforce Attack (Vivek Kumar - 7 April, 2016)
Cryptompress, a new 128-bit (initial) private-key cryptography algorithm is proposed. It uses a block size of at least 30 bits and increments prior key size to additional 32 bits on each unsuccessful attempt of any means, including bruteforcing, further changing a specific portion of the cyphertext using the reformed Feistel network
Link: https://arxiv.org/abs/1604.02128
====================================================
On a Class of Almost Difference Sets Constructed by Using the Ding-Helleseth-Martinsens Constructions (Minglong Qi - 18 February, 2016)
How to construct new families of almost difference set is an important research topic in such fields as communication, coding theory and cryptography. In a work of Ding, Helleseth, and Martinsen in 2001, the authors developed a new method, known as the Ding-Helleseth-Martinsens Constructions in literature, of constructing an almost difference set from product sets of GF(2) and the union of two cyclotomic classes of order four. In the present paper, we have constructed two classes of almost difference set with product sets between GF(2) and union sets of the cyclotomic classes of order 12 using that method
Link: https://arxiv.org/abs/1602.06006
====================================================
Practical Fault-Tolerant Data Aggregation (Krzysztof Grining - 31 May, 2016)
During Financial Cryptography 2012 Chan et al
Link: https://arxiv.org/abs/1602.04138
====================================================
Separating hash families: A Johnson-type bound and new constructions (Chong Shangguan - 24 October, 2016)
Separating hash families are useful combinatorial structures which are generalizations of many well-studied objects in combinatorics, cryptography and coding theory. Walker II and Colbourn conjectured that $p_3(3,q)=o(q^2)$. We verify this conjecture by proving $q^{2-o(1)}<p_3(3,q)=o(q^2)$. We also prove $q^{2-o(1)}<p_4(4,q)=o(q^2)$
Link: https://arxiv.org/abs/1601.04807
====================================================
Invertible binary matrix with maximum number of $2$-by-$2$ invertible submatrices (Yiwei Zhang - 9 January, 2016)
Since then there have been various applications of AONTs in cryptography and security. D'Arco, Esfahani and Stinson conjectured that the limit is between 0.492 and 0.625
Link: https://arxiv.org/abs/1601.02109
====================================================
On the Linear Complexity of Generalized Cyclotomic Quaternary Sequences with Length $2pq$ (Minglong Qi - 26 February, 2016)
According to the Berlekamp-Massey algorithm, these sequences are viewed as enough good for the use in cryptography. We show also that if the character of the extension field $\mathbf{GF}(r^{m})$, $r$, is chosen so that $\bigl(\tfrac{r}{p}\bigr) = \bigl(\tfrac{r}{q}\bigr) = -1$, $r\nmid 3pq-1$, and $r\nmid 2pq-4$, then the linear complexity can reach the maximal value equal to the length of the sequences.
Link: https://arxiv.org/abs/1512.03871
====================================================
Autocorrelation values and Linear complexity of generalized cyclotomic sequence of order four, and construction of cyclic codes (Priti Kumari - 5 March, 2016)
So, the sequence can be used in many domains such as cryptography and coding theory. We employ this sequence of order $4$ to construct several classes of cyclic codes over $\mathrm{GF}(q)$ with length $n_1n_2$
Link: https://arxiv.org/abs/1510.05467
====================================================
A characterization of a class of optimal three-weight cyclic codes of dimension 3 over any finite field (Gerardo Vega - 20 August, 2015)
On the other hand, it is also well known that cyclic codes with few weights have a great practical importance in coding theory and cryptography. In this work we present a characterization of a class of optimal three-weight cyclic codes of dimension 3 over any finite field
Link: https://arxiv.org/abs/1508.05077
====================================================
HORNET: High-speed Onion Routing at the Network Layer (Chen Chen - 8 February, 2016)
Our system uses only symmetric cryptography for data forwarding yet requires no per-flow state on intermediate nodes. This design enables HORNET nodes to process anonymous traffic at over 93 Gb/s
Link: https://arxiv.org/abs/1507.05724
====================================================
Towards a New Paradigm for Privacy and Security in Cloud Services (Thomas Loruenser - 21 July, 2015)
The EU Project Prismacloud (Horizon 2020 programme; duration 2/2015-7/2018) addresses these challenges and yields a portfolio of novel technologies to build security enabled cloud services, guaranteeing the required security with the strongest notion possible, namely by means of cryptography
Link: https://arxiv.org/abs/1506.05980
====================================================
Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic (Pablo Rauzy - 17 June, 2015)
In his keynote speech at CHES 2004, Kocher advocated that side-channel attacks were an illustration that formal cryptography was not as secure as it was believed because some assumptions (e.g., no auxiliary information is available during the computation) were not modeled. The tools implementing our methods are then demonstrated in a case study on an 8-bit AVR smartcard for which we generate a provably protected present implementation that reveals to be at least 250 times more resistant to CPA attacks.
Link: https://arxiv.org/abs/1506.05285
====================================================
On the Heuristic of Approximating Polynomials over Finite Fields by Random Mappings (Rodrigo S. V. Martins - 6 April, 2016)
The study of iterations of functions over a finite field and the corresponding functional graphs is a growing area of research with connections to cryptography. The combination of these results and our experiments suggests that these polynomials behave like random mappings, extending a heuristic that was known only for degree $2$. We show numerically that the behaviour of Chebyshev polynomials of degree $d \geq 2$ over finite fields present a sharp contrast when compared to other polynomials in their respective classes.
Link: https://arxiv.org/abs/1505.02983
====================================================
On Asymptotic Gate Complexity and Depth of Reversible Circuits With Additional Memory (Dmitry V. Zakablukov - 19 March, 2016)
quantum computation, cryptography and signal processing. In the paper we study reversible logic circuits with additional inputs, which consist of NOT, CNOT and C\textsuperscript{2}NOT gates. We prove upper asymptotic bounds for the Shannon gate complexity function $L(n,q)$ and the depth function $D(n,q)$ in case of $q > 0$: $L(n,q_0) \lesssim 2^n$ if $q_0 \sim n 2^{n-o(n)}$ and $D(n,q_1) \lesssim 3n$ if $q_1 \sim 2^n$.
Link: https://arxiv.org/abs/1505.02372
====================================================
Framework for Wireless Network Security using Quantum Cryptography (Priyanka Bhatia - 8 December, 2014)
In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys.
Link: https://arxiv.org/abs/1412.2495
====================================================
Generating S-Boxes from Semi-fields Pseudo-extensions (Jean-Guillaume Dumas - 10 November, 2014)
In cryptography they must satisfy some criteria (balancedness, high nonlinearity, high algebraic degree, avalanche, or transparency) to provide best possible resistance against attacks. Since it is not even known how many semifields there are of order 256, we propose to build S-Boxes and APN functions via semifields pseudo-extensions of the form S_{2^4}^2, where S_{2^4} is any semifield of order 16 . We report here the construction of 12781 non equivalent S-Boxes with with maximal nonlinearity, differential invariants, degrees and bit interdependency, and 2684 APN functions.
Link: https://arxiv.org/abs/1411.2503
====================================================
On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries (Rafael Dowsley - 10 October, 2014)
Noisy channels are a powerful resource for cryptography as they can be used to obtain information-theoretically secure key agreement, commitment and oblivious transfer protocols, among others. Theory 57(8)}) that in this case there is also a protocol against malicious adversaries achieving the same lower bound, and hence the OT capacity is identical for passive and malicious adversaries
Link: https://arxiv.org/abs/1410.2862
====================================================
A new Watermarking Technique for Medical Image using Hierarchical Encryption (Med Karim Abdmouleh - 16 September, 2014)
Cryptography has a specific role, is to protect secret files against unauthorized access. Experimental results on a database of 200 medical images show that the proposed method significantly gives better results.
Link: https://arxiv.org/abs/1409.4587
====================================================
A Note on the Bellare-Rivest Protocol for Translucent Cryptography (Zhengjun Cao - 14 August, 2014)
We remark that the Bellare-Rivest protocol for translucent cryptography [J. Cryptology (1999) 12: 117-139] can not truly enable the government to decrypt partial encrypted communications.
Link: https://arxiv.org/abs/1408.3452
====================================================
Publickey encryption by ordering (Yoshihiro Terasawa - 2 August, 2014)
In 1999, public key cryptography using the matrix was devised by a hish school student of 16 yesrs old girl Sarah Flannery
Link: https://arxiv.org/abs/1408.0366
====================================================
Erasure-Coded Byzantine Storage with Separate Metadata (Elli Androulaki - 20 February, 2014)
Furthermore, AWE is efficient since it does not use public-key cryptography and requires data nodes that support only reads and writes, further reducing the cost of deployment and ownership of a distributed storage solution. This enables AWE to be the first BFT protocol that uses as few as $2t+k$ data nodes to tolerate $t$ Byzantine nodes, for any $k \ge 1$.
Link: https://arxiv.org/abs/1402.4958
====================================================
On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency (Nicolas T. Courtois - 2 December, 2014)
Bitcoin is a "crypto currency", a decentralized electronic payment scheme based on cryptography. Bitcoin economy grows at an incredibly fast rate and is now worth some 10 billions of dollars
Link: https://arxiv.org/abs/1402.1718
====================================================
Performance Evaluation of ECC in Single and Multi Processor Architectures on FPGA Based Embedded System (Sruti Agarwal - 14 January, 2014)
The popular Elliptic Curve Cryptography (ECC), which is superior over other public-key crypto-systems like RSA in many ways, such as providing greater security for a smaller key size, is cho- sen in this work and the possibilities of its implementation in FPGA based embedded systems for both single and dual processor core architectures in- volving task parallelization have been explored. This exploration, which is first of its kind considering the other existing works, is a needed activity for evaluating the best possible architectural environment for ECC implementa- tion on FPGA (Virtex4 XC4VFX12, FF668, -10) based embedded platform.
Link: https://arxiv.org/abs/1401.3421
====================================================
Hardware Implementation of four byte per clock RC4 algorithm (Rourab Paul - 13 January, 2014)
In the field of cryptography till date the 2-byte in 1-clock is the best known RC4 hardware design [1], while 1-byte in 1-clock [2], and the 1-byte in 3 clocks [3][4] are the best known implementation. The design algorithm in[2] considers two consecutive bytes together and processes them in 2 clocks. The design [1] is a pipelining architecture of [2]. In this paper considering the RC4 algorithm, as it is, a simpler RC4 hardware design providing higher throughput is proposed in which 6 different architecture has been proposed. In design 1, 1-byte is processed in 1-clock, design 2 is a dynamic KSA-PRGA architecture of Design 1. Design 3 can process 2 byte in a single clock, where as Design 4 is Dynamic KSA-PRGA architecture of Design 3. Design 5 and Design 6 are parallelization architecture design 2 and design 4 which can compute 4 byte in a single clock. The maturity in terms of throughput, power consumption and resource usage, has been achieved from design 1 to design 6
Link: https://arxiv.org/abs/1401.2727
====================================================
A distributed prime sieving algorithm based on Scheduling by Multiple Edge Reversal (Gabriel Paillard - 16 December, 2013)
From Eratosthenes, who elaborated the first prime sieve (more than 2000 years ago), to the current generation of parallel computers, which have permitted to reach larger bounds on the interval or to obtain previous results in a shorter time, prime numbers generation still represents an attractive domain of research and plays a central role in cryptography. The message complexity achieves at most $nÎ_N + \lfloor \sqrt{n}\rfloor Î_N$, where $1\le Î_N\le N - 1$ is the maximal multidegree of $\mathcal{M}$, and the maximal amount of memory space required per process is $\mathcal{O}(n)$ bits.
Link: https://arxiv.org/abs/1312.4508
====================================================
Three New Families of Zero-difference Balanced Functions with Applications (Cunsheng Ding - 16 December, 2013)
Zero-difference balanced (ZDB) functions integrate a number of subjects in combinatorics and algebra, and have many applications in coding theory, cryptography and communications engineering. The other two constructions are based on $2$-cyclotomic cosets and yield ZDB functions on $\Z_n$ with new parameters
Link: https://arxiv.org/abs/1312.4252
====================================================
Deterministic Primality Testing - understanding the AKS algorithm (Vijay Menon - 15 November, 2013)
Prime numbers play a very vital role in modern cryptography and especially the difficulties involved in factoring numbers composed of product of two large prime numbers have been put to use in many modern cryptographic designs. Although there had been many probabilistic algorithms for primality testing, there wasn't a deterministic polynomial time algorithm until 2002 when Agrawal, Kayal and Saxena came with an algorithm, popularly known as the AKS algorithm, which could test whether a given number is prime or composite in polynomial time
Link: https://arxiv.org/abs/1311.3785
====================================================
The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining (Nicolas T. Courtois - 10 April, 2014)
A paper at Financial Cryptography 2012 conference explains that it is a system which "uses no fancy cryptography", and is "by no means perfect". We estimate the speed of this process and we show that the cost of this process is less than it seems and it depends on a certain cryptographic constant which we estimated to be at most 1.86. A major change have been proposed in May 2013 at Bitcoin conference in San Diego by Dan Kaminsky
Link: https://arxiv.org/abs/1310.7935
====================================================
On the $k$-error linear complexity for $2^n$-periodic binary sequences via Cube Theory (Jianqin Zhou - 7 September, 2013)
The linear complexity and k-error linear complexity of a sequence have been used as important measures of keystream strength, hence designing a sequence with high linear complexity and $k$-error linear complexity is a popular research topic in cryptography. Thirdly, a characterization is presented about the $t$th ($t>1$) decrease in the $k$-error linear complexity for a $2^n$-periodic binary sequence $s$ and this is a continuation of Kurosawa et al
Link: https://arxiv.org/abs/1309.1829
====================================================
The Vernam cipher is robust to small deviations from randomness (Boris Ryabko - 9 March, 2013)
The Vernam cipher (or one-time pad) has played an important rule in cryptography because it is a perfect secrecy system. $ is enciphered according to the formula $Z_i = (X_i + Y_i) \mod 2 $, where $Y_1 Y_2 ...$ is a key sequence generated by the Bernoulli source with equal probabilities of 0 and 1, anyone who knows $Z_1 Z_2 ..
Link: https://arxiv.org/abs/1303.2219
====================================================
Proofs of Writing for Efficient and Robust Storage (Dan Dobre - 24 December, 2012)
At the heart of PoWerStore are Proofs of Writing (PoW): a novel storage technique based on lightweight cryptography. PoW enable reads and writes in the single-writer variant of PoWerStore to have latency of 2 rounds of communication between a client and storage servers in the worst-case (which we show optimal)
Link: https://arxiv.org/abs/1212.3555
====================================================
A Generation-based Text Steganography Method using SQL Queries (Youssef Bassil - 10 December, 2012)
In fact, cryptography scrambles data so that they become unreadable by eavesdroppers; while, steganography hides the very existence of data so that they can be transferred unnoticed. In effect, the output SQL carrier is dynamically generated out of the input message using a dictionary of words implemented as a hash table and organized into 65 categories, each of which represents a particular character in the language
Link: https://arxiv.org/abs/1212.2067
====================================================
Joint Secured and Robust Technique for OFDM Systems ( Al-Dweik - 10 December, 2012)
The proposed system is implemented by developing a new OFDM symbol structure based on symmetric key cryptography. For particular frequency-selective fading channels, the bit error rate (BER) improvements was about 15 dB at BER of 10E-4.
Link: https://arxiv.org/abs/1212.1969
====================================================
Nonlinearity of quartic rotation symmetric Boolean functions (Liping Yang - 10 December, 2012)
Nonlinearity of rotation symmetric Boolean functions is an important topic on cryptography algorithm. Let $e\ge 1$ be any given integer. Finally, we conjecture that if $l\ge 4$ is an integer, then the nonlinearity of the rotation symmetric Boolean function generated by the monomial $x_0x_ex_{2e}...x_{le}$ equals its weight.
Link: https://arxiv.org/abs/1212.1611
====================================================
A Mathematical Random Number Generator (MRNG) (Osvaldo Skliar - 21 November, 2012)
Users interested in applications in cryptography can build another MRNG, but they would have to withhold information - specified in section 5 - from people who are not authorized to decode messages encrypted using that resource.
Link: https://arxiv.org/abs/1211.5052
====================================================
Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC) (Arindam Sarkar - 9 November, 2012)
Though conventional Elliptic Curve Cryptography (ECC) which is a sort of public key cryptography used in wireless communication provides equivalent level of security like other existing public key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN
Link: https://arxiv.org/abs/1211.2087
====================================================
Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm (Roohallah Rastaghi - 28 October, 2012)
Sattar, "An improved knapsack public key cryptography system", International Journal of Internet Technology and Secured Transactions, Vol.3 (3), pp.310-319, 2011] used Shamir's attack on the basic Merkle-Hellman cryptosystem to break this cryptosystem.
Link: https://arxiv.org/abs/1210.7417
====================================================
Efficient Refreshing Protocol for Leakage-Resilient Storage Based on the Inner-Product Extractor (Marcin Andrychowicz - 21 September, 2012)
A recent trend in cryptography is to protect data and computation against various side-channel attacks. Dziembowski and Faust (TCC 2012) have proposed a general way to protect arbitrary circuits against any continual leakage assuming that: (i) the memory is divided into the parts, which leaks independently (ii) the leakage in each observation is bounded (iii) the circuit has an access to a leak-free component, which samples random orthogonal vectors
Link: https://arxiv.org/abs/1209.4820
====================================================
Proactively Accountable Anonymous Messaging in Verdict (Henry Corrigan-Gibbs - 26 June, 2013)
While verifiable DC-nets incurs higher computation overheads due to the public-key cryptography involved, our experiments suggest Verdict is practical for anonymous group messaging or microblogging applications, supporting groups of 100 clients at 1 second per round or 1000 clients at 10 seconds per round
Link: https://arxiv.org/abs/1209.4819
====================================================
AES-CBC Software Execution Optimization (Razvi Doomun - 15 August, 2012)
But, cryptography is primarily a computationally intensive process. The use of optimized AES-CBC software implementation gives a superior encryption speed performance by 12 - 30%, but at the cost of twice more memory for code size.
Link: https://arxiv.org/abs/1208.3227
====================================================
Confidentiality without Encryption For Cloud Computational Privacy (Sashank Dara - 31 July, 2012)
While the advances in cryptography research are promising, there are no practical solutions yet for performing any operations on encrypted data [1]. Rivest [2]. While this technique has been proposed for packet based communication system, its not adaptable in all cloud service models like Software-as-Service, Platform-as-Service or Infrastructure-as-Service [3]
Link: https://arxiv.org/abs/1208.0070
====================================================
Public Key Cryptography Standards: PKCS (Yongge Wang - 23 July, 2012)
This chapter discusses Public-Key Cryptography Standards (PKCS) which have significant impact on the use of public key cryptography in practice. PKCS standards are a set of standards, called PKCS #1 through #15
Link: https://arxiv.org/abs/1207.5446
====================================================
Parametrized Complexity of Weak Odd Domination Problems (David Cattanéo - 14 January, 2015)
The maximum of $κ(G)$ and $|V|-κ'(G)$, denoted $κ_Q(G)$, plays a crucial role in quantum cryptography. In particular deciding, given a graph $G$ and $k>0$, whether $κ_Q(G)\le k$ is of practical interest in the design of graph-based quantum secret sharing schemes. We mainly prove the fixed-parameter intractability (W$[1]$-hardness) of these problems
Link: https://arxiv.org/abs/1206.4081
====================================================
A simple 1-byte 1-clock RC4 design and its efficient implementation in FPGA coprocessor for secured ethernet communication (Rourab Paul - 27 July, 2012)
In the field of cryptography till date the 1-byte in 1-clock is the best known RC4 hardware design [1], while the 1-byte in 3clocks is the best known implementation [2,3]. The design algorithm in [1] considers two consecutive bytes together and processes them in 2 clocks
Link: https://arxiv.org/abs/1205.1737
====================================================
Improved Quantum LDPC Decoding Strategies For The Misidentified Quantum Depolarizing Channel (Yixuan Xie - 13 May, 2015)
Quantum cryptography via key distribution mechanisms that utilize quantum entanglement between sender-receiver pairs will form the basis of future large-scale quantum networks. In this work we help remedy this situation by proposing new quantum LDPC decoding strategies that can significantly reduce performance degradation by as much as $50\%$
Link: https://arxiv.org/abs/1204.4223
====================================================
A new class of hyper-bent Boolean functions in binomial forms (Chunming Tang - 6 May, 2012)
Bent functions have been extensively studied due to their applications in cryptography, such as S-box, block cipher and stream cipher. Hyper-bent functions, as a special class of bent functions, were introduced by Youssef and Gong in 2001, which have stronger properties and rarer elements. In this paper, we consider functions defined over $\mathbb{F}_{2^n}$ by $f_{a,b}:=\mathrm{Tr}_{1}^{n}(ax^{(2^m-1)})+\mathrm{Tr}_{1}^{4}(bx^{\frac{2^n-1}{5}})$, where $n=2m$, $m\equiv 2\pmod 4$, $a\in \mathbb{F}_{2^m}$ and $b\in\mathbb{F}_{16}$. When $a\in \mathbb{F}_{2^m}$ and $(b+1)(b^4+b+1)=0$, with the help of Kloosterman sums and the factorization of $x^5+x+a^{-1}$, we present a characterization of hyper-bentness of $f_{a,b}$. Further, we use generalized Ramanujan-Nagell equations to characterize hyper-bent functions of $f_{a,b}$ in the case $a\in\mathbb{F}_{2^{\frac{m}{2}}}$.
Link: https://arxiv.org/abs/1112.0062
====================================================
Non-Malleable Codes from the Wire-Tap Channel (Hervé Chabanne - 19 May, 2011)
introduced the notion of non-malleable codes (NMC), inspired from the notion of non-malleability in cryptography and the work of Gennaro et al. in 2004 on tamper proof security
Link: https://arxiv.org/abs/1105.3879
====================================================
Eavesdropping on GSM: state-of-affairs (Fabian van den Broek - 3 January, 2011)
In the almost 20 years since GSM was deployed several security problems have been found, both in the protocols and in the - originally secret - cryptography
Link: https://arxiv.org/abs/1101.0552
====================================================
Steepest Ascent Hill Climbing For A Mathematical Problem (Siby Abraham - 2 October, 2010)
Such equations are important as they have many applications in fields like public key cryptography, integer factorization, algebraic curves, projective curves and data dependency in super computers. x1 p1 + a2. x2 p2 + .....
Link: https://arxiv.org/abs/1010.0298
====================================================
Malicious cryptography techniques for unreversable (malicious or not) binaries (Eric Filiol - 21 September, 2010)
In this paper, we show how to amour code in such a way that reserse engineering techniques (static and dymanic) are absolutely impossible by combining malicious cryptography techniques developped in our laboratory and new types of programming (k-ary codes). A simple 400 Kb of executable code enables to produce a binary code and around $2^{140}$ mutated forms natively while going far beyond the old concept of decryptor.
Link: https://arxiv.org/abs/1009.4000
====================================================
About functions where function input describes inner working of the function (Rade Vuckovac - 27 July, 2010)
That fact have impact to the wide spectrum of phenomena such as negative findings of Random Oracle Model in cryptography, complexity in some rules of cellular automata (Wolfram rule 30) and determinism in the true randomness to name just a few.
Link: https://arxiv.org/abs/1007.4660
====================================================
Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks (Hao Chen - 18 July, 2010)
Recently the hierarchical cryptography and the key management for hierarchical networks have been active topics(see \cite{BBG05,GHKRRW08,GS02,HNZI02,HL02,Matt04}. Key agreement schemes for hierarchical networks were presented in \cite{Matt04,GHKRRW08} which is based on the Blom key predistribution scheme(Blom KPS, [1]) and pairing. 1)$O(A_KU)$ storage at each node in the network where $U$ is the expansion number and $A_K$ is the number of nodes at the $K$-th level of the hierarchical network; 2)Strongly resilience to the compromising of arbitrary many leaf and internal nodes; 3)Information theoretical security without random oracle.
Link: https://arxiv.org/abs/1007.3046
====================================================
Affine equivalence of cubic homogeneous rotation symmetric Boolean functions (Thomas W. Cusick - 24 October, 2011)
Homogeneous rotation symmetric Boolean functions have been extensively studied in recent years because of their applications in cryptography. The simplest case of quadratic rotation symmetric functions which are generated by cyclic permutations of the variables in a single monomial was only settled in 2009. This conjecture is verified if n < 22. Our method gives much more information about the equivalence classes; for example, in this paper we give a complete description of the equivalence classes when n is a prime or a power of 3.
Link: https://arxiv.org/abs/1007.1938
====================================================
Cresterea securitatii sistemelor informatice si de comunicatii prin criptografia cuantica (Catalin Anghel - 28 June, 2010)
Catch 22 of cryptography - "Before two parties can communicate in secret, they must first communicate in secret"
Link: https://arxiv.org/abs/1006.5381
====================================================
Recursive Information Hiding in Visual Cryptography (Sandeep Katta - 13 May, 2010)
Visual Cryptography is a secret sharing scheme that uses the human visual system to perform computations. This paper presents a recursive hiding scheme for 3 out of 5 secret sharing
Link: https://arxiv.org/abs/1004.4914
====================================================
New Visual Cryptography Algorithm For Colored Image (Sozan Abdulla - 26 April, 2010)
Visual Cryptography is a special encryption technique to hide information in images, which divide secret image into multiple layers. The decoding requires only selecting some subset of these 3 images, making transparencies of them, and stacking them on top of each other, so the forth picture is reconstructed by printing the three output images onto transparencies and stacking them together
Link: https://arxiv.org/abs/1004.4445
====================================================
Uses of randomness in computation (Richard P. Brent - 19 April, 2010)
Examples include simulation, number theory (primality testing and integer factorization), fault tolerance, routing, cryptography, optimization by simulated annealing, and perfect hashing. This is the text of an invited talk presented at "Theory Day", University of NSW, Sydney, 22 April 1994.
Link: https://arxiv.org/abs/1004.3108
====================================================
A Secure Hash Function MD-192 With Modified Message Expansion (Harshvardhan Tiwari - 7 March, 2010)
Cryptographic hash functions play a central role in cryptography. In this paper a new approach is presented that produces 192 bit message digest and uses a modified message expansion mechanism which generates more bit difference in each working variable to make the algorithm more secure
Link: https://arxiv.org/abs/1003.1492
====================================================
Hardware Implementation of TDES Crypto System with On Chip Verification in FPGA (Prasun Ghosal - 25 February, 2010)
A fast and compact FPGA based implementation of the Data Encryption Standard (DES) and Triple DES algorithm is presented in this paper that is widely used in cryptography for securing the Internet traffic in modern day communication systems. The design of the digital cryptographic circuit was implemented in a Vertex 5 series (XCVLX5110T) target device with the use of VHDL as the hardware description language. Spartan 3, Spartan 3AN, Virtex 5, Virtex E device families. The novelty and contribution of this work is in three folds: (i) Extensive simulation and synthesis of the proposed design targeted for various FPGA devices, (ii) Complete hardware implementation of encryption and decryption algorithms onto Virtex 5 series device (XCVLX5110T) based FPGA boards and, (iii) Generation of ICON and VIO core for the design and on chip verification and analyzing using Chipscope Pro
Link: https://arxiv.org/abs/1002.4836
====================================================
REESSE1+ . Reward . Proof by Experiment . A New Approach to Proof of P != NP (Shenghui Su - 25 August, 2014)
The authors discuss what is provable security in cryptography. Lastly, a reward is offered for the subexponential time solutions to the three REESSE1+ problems: MPP, ASPP, and TLP with n >= 80 and lg M >= 80, which may be regarded as a type of security proof by experiment.
Link: https://arxiv.org/abs/0908.0482
====================================================
Proof of a Conjecture on the Sequence of Exceptional Numbers, Classifying Cyclic Codes and APN Functions (Fernando Hernando - 18 September, 2009)
This conjecture arises in two different ways, from cryptography and from coding theory. An odd integer $t\geq 3$ is said to be exceptional if $f(x)=x^t$ is APN (Almost Perfect Nonlinear) over $\mathbb{F}_{2^n}$ for infinitely many values of $n$. Equivalently, $t$ is exceptional if the binary cyclic code of length $2^n-1$ with two zeros $Ï, Ï^t$ has minimum distance 5 for infinitely many values of $n$
Link: https://arxiv.org/abs/0903.2016
====================================================
Analysis of Prime Reciprocal Sequences in Base 10 (Sumanth Kumar Reddy Gangasani - 24 January, 2008)
Prime reciprocals have applications in coding and cryptography and for generation of random sequences. This paper investigates the structural redundancy of prime reciprocals in base 10 in a manner that parallels an earlier study for binary prime reciprocals. It is also shown that the frequency of digit 0 exceeds that of every other digit when the entire set of prime reciprocal sequences is considered.
Link: https://arxiv.org/abs/0801.3841
====================================================
Bounds for Visual Cryptography Schemes (Hossein Hajiabolhassan - 3 December, 2009)
In this regard, we consider visual cryptography schemes introduced by Tzeng and Hu [13]. [4] introduced a lower bound for the best pixel expansion of this scheme in terms of minimal qualified sets
Link: https://arxiv.org/abs/0710.4828
====================================================
Efficient FPGA-based multipliers for F_{3^97} and F_{3^{6*97}} (Jamshid Shokrollahi - 22 August, 2007)
The fields F_{3^{97}} and F_{3^{6*97}} are relevant in the context of pairing-based cryptography.
Link: https://arxiv.org/abs/0708.3022
====================================================
Explicit formulas for efficient multiplication in F_{3^{6m}} (Elisa Gorla - 22 August, 2007)
Efficient computation of the Tate pairing is an important part of pairing-based cryptography. Recently with the introduction of the Duursma-Lee method special attention has been given to the fields of characteristic 3. In this paper we propose a new method to reduce the number of F_{3^m} multiplications for multiplication in F_{3^{6m}} from 18 in recent implementations to 15
Link: https://arxiv.org/abs/0708.3014
====================================================
On the Analysis and Generalization of Extended Visual Cryptography Schemes (DaoShun Wang - 30 October, 2006)
An Extended Visual Cryptography Scheme (EVCS) was proposed by Ateniese et al. [3] to protect a binary secret image with meaningful (innocent-looking) shares. The minimum size of the extended matrix was obtained from a hypergraph coloring model and the scheme was designed for binary images only [3]. This scheme is an extension of the (n, n) VCS for multiple binary images proposed in Droste scheme [2].
Link: https://arxiv.org/abs/cs/0610172
====================================================
Reducing the Computation of Linear Complexities of Periodic Sequences over $GF(p^m)$ (Hao Chen - 17 September, 2006)
The linear complexity of a periodic sequence over $GF(p^m)$ plays an important role in cryptography and communication [12]
Link: https://arxiv.org/abs/cs/0607104
====================================================
Baptista-type chaotic cryptosystems: Problems and countermeasures (Shujun Li - 3 November, 2004)
Baptista proposed a chaotic cryptosystem, which has attracted much attention from the chaotic cryptography community: some of its modifications and also attacks have been reported in recent years. A 307 (2003) 22], we suggested a method to enhance the security of Baptista-type cryptosystem, which can successfully resist all proposed attacks
Link: https://arxiv.org/abs/cs/0402004
====================================================
EPIC: Efficient Privacy-Preserving Scheme with E2E Data Integrity and Authenticity for AMI Networks (Ahmad Alsharif - 3 October, 2018)
These schemes aggregate individual readings and send an aggregated reading to the utility, but they extensively use asymmetric-key cryptography which involves large computation/communication overhead
Link: https://arxiv.org/abs/1810.01851
====================================================
SecGrid: A Secure and Efficient SGX-enabled Smart Grid System with Rich Functionalities (Shaohua Li - 3 October, 2018)
Moreover, the resource-constrained smart meters need to perform heavy asymmetric cryptography in these solutions, which is not applied to smart grid
Link: https://arxiv.org/abs/1810.01651
====================================================
Error correction in quantum cryptography based on artificial neural networks (Marcin Niemiec - 1 October, 2018)
This article presents a new idea for a key reconciliation method in quantum cryptography. It has been shown that the synchronization process in the new solution is much faster than in the analogous scenario used in neural cryptography
Link: https://arxiv.org/abs/1810.00957
====================================================
AND Protocols Using Only Uniform Shuffles (Suthee Ruangwises - 1 October, 2018)
One of the main problems in card-based cryptography is to design committed-format protocols to compute a Boolean AND operation subject to different runtime and shuffle restrictions by using as few cards as possible
Link: https://arxiv.org/abs/1810.00769
====================================================
Stronger Cryptography For Every Device, Everywhere (JV Roig - 1 October, 2018)
Generating secure random numbers is a central problem in cryptography that needs a reliable source of enough computing entropy
Link: https://arxiv.org/abs/1810.00567
====================================================
Efficient Construction of S-boxes Based on a Mordell Elliptic Curve Over a Finite Field (Naveed Ahmed Azam - 28 September, 2018)
Elliptic curve cryptography (ECC) is used in many security systems due to its small key size and high security as compared to the other cryptosystems
Link: https://arxiv.org/abs/1809.11057
====================================================
Answering the "why" in Answer Set Programming - A Survey of Explanation Approaches (Jorge Fandinno - 21 September, 2018)
Thanks to the emergence of efficient solvers, ASP has recently been used for problem-solving in a variety of domains, including medicine, cryptography, and biology
Link: https://arxiv.org/abs/1809.08034
====================================================
Algorithmic Obfuscation over GF($2^m$) (Cunxi Yu - 17 September, 2018)
Galois Field arithmetic blocks are the key components in many security applications, such as Elliptic Curve Cryptography (ECC) and the S-Boxes of the Advanced Encryption Standard (AES) cipher
Link: https://arxiv.org/abs/1809.06207
====================================================
Linear Complexity of Geometric Sequences Defined by Cyclotomic Classes and Balanced Binary Sequences Constructed by the Geometric Sequences (Kazuyoshi Tsuchiya - 12 September, 2018)
Pseudorandom number generators are required to generate pseudorandom numbers which have good statistical properties as well as unpredictability in cryptography
Link: https://arxiv.org/abs/1809.04957
====================================================
Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies (Benjamin Smith - 20 September, 2018)
Diffie-Hellman key exchange is at the foundations of public-key cryptography, but conventional group-based Diffie-Hellman is vulnerable to Shor's quantum algorithm
Link: https://arxiv.org/abs/1809.04803
====================================================
Post-Quantum Secure Cryptographic Algorithms (Xenia Bogomolec - 12 September, 2018)
An overview on current developments in post quantum cryptography
Link: https://arxiv.org/abs/1809.00371
====================================================
A Perspective on Unique Information: Directionality, Intuitions, and Secret Key Agreement (Ryan G. James - 26 August, 2018)
Drawing parallels with secret key agreement rates from information-theoretic cryptography, we demonstrate that these intuitions are mutually incompatible and suggest that this underlies the persistence of competing definitions and interpretations
Link: https://arxiv.org/abs/1808.08606
====================================================
StreamChain: Do Blockchains Need Blocks? (Zsolt István - 25 August, 2018)
The original role of blocks is to amortize the cost of cryptography (e.g., solving proof-of-work) and to make data transfers more efficient in a geo-distributed setting
Link: https://arxiv.org/abs/1808.08406
====================================================
PPP-Completeness with Connections to Cryptography (Katerina Sotiraki - 20 August, 2018)
Specifically, we show that constrained-SIS (cSIS), a generalized version of the well-known Short Integer Solution problem (SIS) from lattice-based cryptography, is PPP-complete.
Link: https://arxiv.org/abs/1808.06407
====================================================
Exploiting DRAM Latency Variations for Generating True Random Numbers (B. M. S. Bahar Talukder - 6 August, 2018)
True random number generator (TRNG) plays a vital role in cryptography to ensure confidentiality, integrity, and safety in modern electronic systems because their failure can endanger privacy and undermine the viability of cyber-physical systems
Link: https://arxiv.org/abs/1808.02068
====================================================
CT-Wasm: Type-driven Secure Cryptography for the Web Ecosystem (Conrad Watt - 3 August, 2018)
A significant amount of both client and server-side cryptography is implemented in JavaScript. With the new introduction of the WebAssembly bytecode language (Wasm) into the web ecosystem, we have a unique opportunity to advance a principled alternative to existing JavaScript cryptography use cases which does not compromise this convenience.
Link: https://arxiv.org/abs/1808.01348
====================================================
ABE-Cities: An Attribute-Based Encryption System for Smart Cities (Marco Rasori - 31 July, 2018)
In ABE-Cities, the sensing devices perform only lightweight symmetric cryptography operations, thus they can also be resource-constrained
Link: https://arxiv.org/abs/1807.11793
====================================================
Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks (Hawzhin Mohammed - 30 July, 2018)
To allow the utility company to gather the power consumption information while safeguarding the consumers' privacy, different methods that broadly utilize symmetric key and asymmetric key cryptography operation have been generally utilized. In this paper, we propose an effective method that uses symmetric key cryptography and hashing operation to gather power consumption information
Link: https://arxiv.org/abs/1807.11565
====================================================
Restructuring of Discrete Logarithm Problem and ElGamal Cryptosystem by Using the Power Fibonacci Sequence Module M (Cagla Ozyilmaz - 16 July, 2018)
In this paper, we have studied on adapting to asymmetric cryptography power Fibonacci sequence module m . Lastly, we have compared that ElGamal Cryptosystem and a new cryptosystem which we constitute in terms of cryptography and we have obtained that a new cryptosystem is more advantageuos than ElGamal Cryptosystem.
Link: https://arxiv.org/abs/1807.08613
====================================================
Multivariate Public Key Cryptography and Digital Signature (Pulugurtha Krishna Subba Rao - 23 July, 2018)
In this paper, algorithms for multivariate public key cryptography and digital signature are described
Link: https://arxiv.org/abs/1807.07710
====================================================
Fast Modular Subset Sum using Linear Sketching (Kyriakos Axiotis - 12 July, 2018)
This is a natural generalization of the Subset Sum problem (where m=+\infty) with ties to additive combinatorics and cryptography.
Link: https://arxiv.org/abs/1807.04825
====================================================
Active Secure Coding Based on Eavesdropper Behavior Learning (Yizhi Zhao - 8 July, 2018)
For active wiretap channel, the effectiveness of cryptography embedded secure coding schemes are limited due to the passive problem of physical layer coding
Link: https://arxiv.org/abs/1807.02924
====================================================
Design of a New Stream Cipher: PALS (Mohammadreza Ashouri - 21 September, 2018)
PALS can be used in many applications, especially in financial cryptography due to its proper security features
Link: https://arxiv.org/abs/1807.01115
====================================================
Extracting Randomness From The Trend of IPI for Cryptographic Operators in Implantable Medical Devices (Hassan Chizari - 28 June, 2018)
The use of asymmetric cryptography is not a practical solution for IMDs due to the scarce computational and power resources, symmetric key cryptography is preferred
Link: https://arxiv.org/abs/1806.10984
====================================================
Cryptanalysis of a Chaotic Key based Image Encryption Scheme (Pratyusa Mukherjee - 25 September, 2018)
During the last few decades, there has been a increasing in chaos-based cryptography
Link: https://arxiv.org/abs/1806.09523
====================================================
An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network (Ngoc Hong Tran - 14 June, 2018)
The private information in the COPE packet are encrypted by Elliptic Curve Cryptography (ECC), and an additional information is inserted into SCOPE packets served for the authentication process using the lightweight hash Elliptic Curve Digital Signature Algorithm (ECDSA)
Link: https://arxiv.org/abs/1806.05430
====================================================
Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO (Anastasiya Gorodilova - 19 September, 2018)
Mathematical problems and their solutions of the Fourth International Students' Olympiad in cryptography NSUCRYPTO'2017 are presented
Link: https://arxiv.org/abs/1806.02059
====================================================
Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing (Mohamed Grissa - 3 June, 2018)
The first consists on using an additional architectural entity at the benefit of incurring lower computation overhead by relying only on symmetric cryptography
Link: https://arxiv.org/abs/1806.00916
====================================================
On the Capacity of Secure Distributed Matrix Multiplication (Wei-Ting Chang - 1 June, 2018)
This problem falls in the category of secure function computation and has received significant attention in the cryptography community
Link: https://arxiv.org/abs/1806.00469
====================================================
How to Simulate It in Isabelle: Towards Formal Proof for Secure Multi-Party Computation (David Butler - 31 May, 2018)
In cryptography, secure Multi-Party Computation (MPC) protocols allow participants to compute a function jointly while keeping their inputs private. We show that existing machinery for reasoning about probabilistic programs adapted to this setting, paving the way to precisely check a new class of cryptography arguments
Link: https://arxiv.org/abs/1805.12482
====================================================
A voting scheme with post-quantum security based on physical laws (Hua Dong - 18 April, 2018)
Traditional cryptography is under huge threat along of the evolution of quantum information and computing
Link: https://arxiv.org/abs/1805.12480
====================================================
Recovering short secret keys of RLCE in polynomial time (Alain Couvreur - 29 May, 2018)
Wang's Random Linear Code Encryption (RLCE) scheme recently submitted to the NIST call for post-quantum cryptography
Link: https://arxiv.org/abs/1805.11489
====================================================
An evaluation of the security of the Bitcoin Peer-to- Peer Network (James Tapsell - 28 May, 2018)
Bitcoin is a decentralised digital currency that relies on cryptography rather than trusted third parties such as central banks for its security
Link: https://arxiv.org/abs/1805.10259
====================================================
Translation of Algorithmic Descriptions of Discrete Functions to SAT with Applications to Cryptanalysis Problems (Alexander Semenov - 17 May, 2018)
In the theoretical part of the paper we justify the main principles of general reduction to SAT for discrete functions from a class containing the majority of functions employed in cryptography. Some of the corresponding attacks are state of the art
Link: https://arxiv.org/abs/1805.07239
====================================================
Lighting the Way to a Smart World: Lattice-Based Cryptography for Internet of Things (Rui Xu - 13 May, 2018)
As a promising candidate for the future post-quantum cryptography standard, lattice-based cryptography enjoys the advantages of strong security guarantees and high efficiency, which make it extremely suitable for IoT applications. In this paper, we summarize the advantages of lattice-based cryptography and the state of art of their implementations for IoT devices.
Link: https://arxiv.org/abs/1805.04880
====================================================
The Hidden Subgroup Problem and Post-quantum Group-based Cryptography (Kelsey Horan - 21 May, 2018)
In this paper we discuss the Hidden Subgroup Problem (HSP) in relation to post-quantum group-based cryptography
Link: https://arxiv.org/abs/1805.04179
====================================================
LedgerGuard: Improving Blockchain Ledger Dependability (Qi Zhang - 2 May, 2018)
Thus, there are typically built-in validation mechanisms leveraging cryptography to ensure the validity of incoming blocks before committing them into the ledger
Link: https://arxiv.org/abs/1805.01081
====================================================
The Reincarnation of Grille Cipher: A Generative Approach (Jia Liu - 14 May, 2018)
Cryptography is committed to the security of content, i.e
Link: https://arxiv.org/abs/1804.06514
====================================================
Towards Lightweight Error Detection Schemes for Implementations of MixColumns in Lightweight Cryptography (Anita Aghaie - 17 April, 2018)
In this paper, through considering lightweight cryptography, we present a comparative realization of MDS matrices used in the VLSI implementations of lightweight cryptography. Our intention in this paper is to propose reliability and error detection mechanisms (through linear codes, recomputations, and FST adopted for lightweight cryptography) to consider the error detection schemes in designing beforehand taking into account such algorithmic security
Link: https://arxiv.org/abs/1804.06480
====================================================
SideRand: A Heuristic and Prototype of a Side-Channel-Based Cryptographically Secure Random Seeder Designed to Be Platform- and Architecture-Agnostic (JV Roig - 9 April, 2018)
With the explosion of network- and internet-connected devices, however, the problem of cryptography is no longer a server-centric problem; even small devices need a reliable source of randomness for cryptographic operations - for example, network devices and appliances like routers, switches and access points, as well as various Internet-of-Things (IoT) devices for security and remote management
Link: https://arxiv.org/abs/1804.02904
====================================================
The Impact of Quantum Computing on Present Cryptography (Vasileios Mavroeidis - 31 March, 2018)
In particular the reader can delve into the following subjects: present cryptographic schemes (symmetric and asymmetric), differences between quantum and classical computing, challenges in quantum computing, quantum algorithms (Shor's and Grover's), public key encryption schemes affected, symmetric schemes affected, the impact on hash functions, and post quantum cryptography. Specifically, the section of Post-Quantum Cryptography deals with different quantum key distribution methods and mathematicalbased solutions, such as the BB84 protocol, lattice-based cryptography, multivariate-based cryptography, hash-based signatures and code-based cryptography.
Link: https://arxiv.org/abs/1804.00200
====================================================
Minimal Linear Codes over Finite Fields (Ziling Heng - 27 March, 2018)
Constructing minimal linear codes with new and desirable parameters has been an interesting research topic in coding theory and cryptography
Link: https://arxiv.org/abs/1803.09988
====================================================
A first look at the usability of bitcoin key management (Shayan Eskandari - 12 February, 2018)
Bitcoin users are directly or indirectly forced to deal with public key cryptography, which has a number of security and usability challenges that differ from the password-based authentication underlying most online banking services
Link: https://arxiv.org/abs/1802.04351
====================================================
Quantum Algorithm for Optimization and Polynomial System Solving over Finite Field and Application to Cryptanalysis (Yu-Ao Chen - 7 October, 2018)
As applications, quantum algorithms are given to three basic computational problems in cryptography: the polynomial system with noise problem, the short integer solution problem, the shortest vector problem, as well as the cryptanalysis for the lattice based NTRU cryptosystem
Link: https://arxiv.org/abs/1802.03856
====================================================
Using a reservoir computer to learn chaotic attractors, with applications to chaos synchronisation and cryptography (Piotr Antonik - 27 June, 2018)
We then show that trained reservoir computers can be used to crack chaos based cryptography and illustrate this on a chaos cryptosystem based on the Mackey-Glass system
Link: https://arxiv.org/abs/1802.02844
====================================================
Some application of difference equations in Cryptography and Coding Theory (Cristina Flaut - 2 September, 2018)
In this paper, we present some applications of a difference equation of degree k in Cryptography and Coding Theory.
Link: https://arxiv.org/abs/1802.02754
====================================================
Linear Complexity and Autocorrelation of two Classes of New Interleaved Sequences of Period $2N$ (Shidong Zhang - 25 January, 2018)
Results show that these sequences have low autocorrelation and the linear complexity satisfies the requirements of cryptography.
Link: https://arxiv.org/abs/1801.08664
====================================================
qrypt0 - encrypted short messages exchanged between offline computers (Andreas O. Bender - 23 January, 2018)
The security of qrypt0 therefore rests on the cryptography and the computer's physical isolation rather than on the computer security of the encrypting device.
Link: https://arxiv.org/abs/1801.07800
====================================================
Post-Quantum Cryptography: Riemann Primitives and Chrysalis (Ian Malloy - 23 January, 2018)
The Chrysalis project is a proposed method for post-quantum cryptography using the Riemann sphere
Link: https://arxiv.org/abs/1801.07702
====================================================
Structural Properties of Twisted Reed-Solomon Codes with Applications to Cryptography (Peter Beelen - 11 May, 2018)
Using these structural properties, we single out a subfamily of the new codes which could be considered for code-based cryptography: These codes resist some existing structural attacks for Reed-Solomon-like codes, i.e
Link: https://arxiv.org/abs/1801.07003
====================================================
The decoding failure probability of MDPC codes (Jean-Pierre Tillich - 15 January, 2018)
Despite this fact they have been proved very useful in cryptography for devising key exchange mechanisms
Link: https://arxiv.org/abs/1801.04668
====================================================
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver (K. Vishnu Priyanka - 11 January, 2018)
The secret sharing schemes are the important tools in cryptography that are used as building blocks in many secured protocols
Link: https://arxiv.org/abs/1801.03758
====================================================
Instruction-Level Abstraction (ILA): A Uniform Specification for System-on-Chip (SoC) Verification (Bo-Yuan Huang - 14 June, 2018)
We demonstrate the applicability of the ILA through several case studies of accelerators (for image processing, machine learning, and cryptography), and a general-purpose processor (RISC-V)
Link: https://arxiv.org/abs/1801.01114
====================================================
Why the Equifax Breach Should Not Have Mattered (Marten Lohstroh - 30 December, 2017)
This paper criticizes the practice of using clear-text identity attributes, such as Social Security or driver's license numbers -- which are in principle not even secret -- as acceptable authentication tokens or assertions of ownership, and proposes a simple protocol that straightforwardly applies public-key cryptography to make identity claims verifiable, even when they are issued remotely via the Internet
Link: https://arxiv.org/abs/1801.00129
====================================================
A multi-candidate electronic voting scheme with unlimited participants (Xi Zhao - 29 December, 2017)
In our scheme the vote is split and hidden, and tallying is made for $G\ddot{o}del$ encoding in decimal base without any trusted third party, and the result does not rely on any traditional cryptography or computational intractable assumption
Link: https://arxiv.org/abs/1712.10193
====================================================
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks (Hengchuan Tan - 28 December, 2017)
Furthermore, the SA-KMP scheme uses symmetric keys derived based on a 3-D-matrix-based key agreement scheme to reduce the high computational costs of using asymmetric cryptography
Link: https://arxiv.org/abs/1712.09859
====================================================
Fast Quantum Algorithm for Solving Multivariate Quadratic Equations (Jean-Charles Faug`ere - 19 December, 2017)
Since this announcement post-quantum cryptography has become a topic of primary interest for several standardization bodies. In this paper we consider the quantum security of the problem of solving a system of {\it $m$ Boolean multivariate quadratic equations in $n$ variables} (\MQb); a central problem in post-quantum cryptography
Link: https://arxiv.org/abs/1712.07211
====================================================
The Potential Impact of Quantum Computers on Society (Ronald de Wolf - 14 December, 2017)
It focuses on three areas: cryptography, optimization, and simulation of quantum systems
Link: https://arxiv.org/abs/1712.05380
====================================================
One More Way to Encrypt a Message (Irina Pashchenko - 7 December, 2017)
This work describes an example of an application of a novel method for symmetric cryptography
Link: https://arxiv.org/abs/1712.02875
====================================================
A general cipher for individual data anonymization (Nicolas Ruiz - 7 December, 2017)
Based on recent contributions from the literature and inspired by cryptography, this paper proposes the first cipher for data anonymization
Link: https://arxiv.org/abs/1712.02557
====================================================
A Language for Probabilistically Oblivious Computation (David Darais - 28 November, 2017)
The use of regions was motivated by a source of unsoundness that we discovered in the type system of ObliVM, a language for implementing state of the art oblivious algorithms and data structures. We prove that Lobliv's type system enforces obliviousness and show that it is nevertheless powerful enough to check state-of-the-art, efficient oblivious data structures, such as stacks and queues, and even tree-based oblivious RAMs.
Link: https://arxiv.org/abs/1711.09305
====================================================
Image Authentication using Visual Cryptography (Rahul Saranjame - 24 November, 2017)
This report gives a novel technique of image encryption and authentication by combining elements of Visual Cryptography and Public Key Cryptography
Link: https://arxiv.org/abs/1711.09032
====================================================
Linear complexity of quaternary sequences over Z4 based on Ding-Helleseth generalized cyclotomic classes (Xina Zhang - 22 November, 2017)
The results show that the sequences possess large linear complexity and are good sequences from the viewpoint of cryptography.
Link: https://arxiv.org/abs/1711.08216
====================================================
Privacy-preserving Edit Distance on Genomic Data (Parisa Kaghazgaran - 22 September, 2018)
Efficiency is always a bottleneck in cryptography domain
Link: https://arxiv.org/abs/1711.06234
====================================================
Application of Machine Learning for Channel based Message Authentication in Mission Critical Machine Type Communication (Andreas Weinand - 14 November, 2017)
Though there are numerous techniques in the sense of conventional cryptography in order to achieve that goal, these are not always suited for the requirements of the applications mentioned due to resource inefficiency
Link: https://arxiv.org/abs/1711.05088
====================================================
Mathematics of Isogeny Based Cryptography (Luca De Feo - 10 November, 2017)
They try to provide a guide for Masters' students to get through the vast literature on elliptic curves, without getting lost on their way to learning isogeny based cryptography. They are by no means a reference text on the theory of elliptic curves, nor on cryptography; students are encouraged to complement these notes with some of the books recommended in the bibliography.
Link: https://arxiv.org/abs/1711.04062
====================================================
Verifiable Light-Weight Monitoring for Certificate Transparency Logs (Rasmus Dahlberg - 10 November, 2017)
Trust in publicly verifiable Certificate Transparency (CT) logs is reduced through cryptography, gossip, auditing, and monitoring
Link: https://arxiv.org/abs/1711.03952
====================================================
Mobile Encryption Gateway (MEG) for Email Encryption (Gregory B Rehm - 6 November, 2017)
Email cryptography applications often suffer from major problems that prevent their widespread implementation
Link: https://arxiv.org/abs/1711.02181
====================================================
Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography (Chengqing Li - 8 June, 2018)
In this paper, we perform a thorough analysis of their algorithm from the view point of modern cryptography
Link: https://arxiv.org/abs/1711.01858
====================================================
Learning With Errors and Extrapolated Dihedral Cosets (Zvika Brakerski - 23 October, 2017)
The hardness of the learning with errors (LWE) problem is one of the most fruitful resources of modern cryptography. In particular, it is one of the most prominent candidates for secure post-quantum cryptography
Link: https://arxiv.org/abs/1710.08223
====================================================
Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography (N. Tokareva - 16 October, 2017)
The mathematical problems and their solutions of the Third International Students' Olympiad in Cryptography NSUCRYPTO'2016 are presented. Two open problems in mathematical cryptography are also discussed and a solution for one of them proposed by a participant during the Olympiad is described
Link: https://arxiv.org/abs/1710.05873
====================================================
Simpler proof for nonlinearity of majority function (Thomas W. Cusick - 16 February, 2018)
Given a Boolean function f, the (Hamming) weight wt(f) and the nonlinearity N(f) are well known to be important in designing functions that are useful in cryptography
Link: https://arxiv.org/abs/1710.02034
====================================================
Secure Coding Practices in Java: Challenges and Vulnerabilities (Na Meng - 28 September, 2017)
Prior research was focused on the misuse of cryptography and SSL APIs, but did not explore the key fundamental research question: what are the biggest challenges and vulnerabilities in secure coding practices? In this paper, we conducted a comprehensive empirical study on StackOverflow posts to understand developers' concerns on Java secure coding, their programming obstacles, and potential vulnerabilities in their code. Multiple programming challenges are related to APIs or libraries, including the complicated cross-language data handling of cryptography APIs, and the complex Java-based or XML-based approaches to configure Spring security
Link: https://arxiv.org/abs/1709.09970
====================================================
Interleaved sequences of geometric sequences binarized with Legendre symbol of two types (Kazuyoshi Tsuchiya - 15 September, 2017)
A pseudorandom number generator is widely used in cryptography
Link: https://arxiv.org/abs/1709.05163
====================================================
Secure and Trustable Distributed Aggregation based on Kademlia (Stéphane Grumbach - 11 September, 2017)
It relies on the distributed hash table Kademlia, used in BitTorrent, for pseudonymous communication between randomly predetermined peers to ensure a high degree of confidentiality which does not solely relies on cryptography
Link: https://arxiv.org/abs/1709.03265
====================================================
New characterization and parametrization of LCD Codes (Claude Carlet - 10 September, 2017)
Due to a newly discovered application in cryptography, there has been renewed interest in LCD codes
Link: https://arxiv.org/abs/1709.03217
====================================================
Node Authentication Using BLS Signature in Distributed PKI Based MANETS (N Chaitanya Kumar - 29 August, 2017)
For this purpose, MANETS adopt two kinds of approaches Public key cryptography and identity-based cryptography
Link: https://arxiv.org/abs/1708.08972
====================================================
Cryptographically Secure Information Flow Control on Key-Value Stores (Lucas Waye - 29 August, 2017)
We present Clio, an information flow control (IFC) system that transparently incorporates cryptography to enforce confidentiality and integrity policies on untrusted storage. We prove that Clio is secure with a novel proof technique that is based on a proof style from cryptography together with standard programming languages results
Link: https://arxiv.org/abs/1708.08895
====================================================
Untangling Blockchain: A Data Processing View of Blockchain Systems (Tien Tuan Anh Dinh - 17 August, 2017)
We analyze both in-production and research systems in four dimensions: distributed ledger, cryptography, consensus protocol and smart contract
Link: https://arxiv.org/abs/1708.05665
====================================================
Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes (Mohamed Amine Ferrag - 14 August, 2017)
We also provide a classification of countermeasures into three types of categories, including, cryptography methods, humans factors, and intrusion detection methods
Link: https://arxiv.org/abs/1708.04027
====================================================
New Results on the DMC Capacity and Renyi's Divergence (Yi Janet Lu - 2 August, 2017)
This proposed problem has great significance in cryptography and communications.
Link: https://arxiv.org/abs/1708.00979
====================================================
Public Evidence from Secret Ballots (Matthew Bernhard - 4 August, 2017)
It is thus not surprising that voting is a rich research area spanning theory, applied cryptography, practical systems analysis, usable security, and statistics
Link: https://arxiv.org/abs/1707.08619
====================================================
Resource-Efficient Common Randomness and Secret-Key Schemes (Badih Ghazi - 25 July, 2017)
This problem is at the core of secret key generation in cryptography, with connections to communication under uncertainty and locality sensitive hashing
Link: https://arxiv.org/abs/1707.08086
====================================================
Applications of Economic and Pricing Models for Wireless Network Security: A Survey (Nguyen Cong Luong - 25 July, 2017)
Additionally, we discuss integrating economic and pricing models with cryptography methods to reduce information privacy leakage as well as to guarantee the confidentiality and integrity of information in wireless networks
Link: https://arxiv.org/abs/1707.07846
====================================================
Blockchain Consensus Protocols in the Wild (Christian Cachin - 7 July, 2017)
We advocate to follow the established practice in cryptography and computer security, relying on public reviews, detailed models, and formal proofs; the designers of several practical systems appear to be unaware of this
Link: https://arxiv.org/abs/1707.01873
====================================================
Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification (Amin Subandi - 5 July, 2017)
Vigenere Cipher is one of the classic cryptographic algorithms and included into symmetric key cryptography algorithm, where to encryption and decryption process use the same key. And weaknesses of the symmetric key cryptographic algorithm is the safety of key distribution factor, if the key is known by others, then the function of cryptography itself become useless
Link: https://arxiv.org/abs/1707.01609
====================================================
A Steganographic Design Paradigm for General Steganographic Objectives (Aubrey Alston - 30 June, 2017)
Beyond the standard scope of private-key steganography, steganography is also potentially interesting from other perspectives; for example, the prospect of steganographic parallels to components in public-key cryptography is particularly interesting
Link: https://arxiv.org/abs/1707.00076
====================================================
A Cryptographic Approach for Steganography (Jacques M. Bahi - 27 June, 2017)
In this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains
Link: https://arxiv.org/abs/1706.08752
====================================================
Reservoir Computing on the Hypersphere (M. Andrecut - 23 June, 2017)
We also show how the proposed system can be applied to symmetric cryptography problems, and we include a numerical implementation.
Link: https://arxiv.org/abs/1706.07896
====================================================
Pay-with-a-Selfie, a human-centred digital payment system (Ernesto Damiani - 22 June, 2017)
Thanks to visual cryptography techniques PGS uses for computing the shares, the original selfie can be recomposed simply by stacking the shares, preserving the analogy with re-joining the two parts of the banknote.
Link: https://arxiv.org/abs/1706.07187
====================================================
Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra (Alessio Caminata - 30 March, 2018)
This allows us to bound the complexity of solving a system of polynomial equations when the associated ideal is zero-dimensional, a common situation in cryptography
Link: https://arxiv.org/abs/1706.06319
====================================================
Obfuscation in Bitcoin: Techniques and Politics (Arvind Narayanan - 29 June, 2017)
We map sixteen proposed privacy-preserving techniques for Bitcoin on an obfuscation-vs.-cryptography axis, and find that those that are used in practice tend toward obfuscation
Link: https://arxiv.org/abs/1706.05432
====================================================
Evaluation of Lightweight Block Ciphers in Hardware Implementation: A Comprehensive Survey (Jaber Hosseinzadeh - 12 June, 2017)
The conventional cryptography solutions are ill-suited to strict memory, size and power limitations of resource-constrained devices, so lightweight cryptography solutions have been specifically developed for this type of applications. In this domain of cryptography, the term lightweight never refers to inadequately low security, but rather to establishing the best balance to maintain sufficient security
Link: https://arxiv.org/abs/1706.03878
====================================================
A lightweight MapReduce framework for secure processing with SGX (Rafael Pires - 16 May, 2017)
Some solutions relying on cryptography were proposed for countering threats but these typically imply a high computational overhead
Link: https://arxiv.org/abs/1705.05684
====================================================
Polar codes for secret sharing (Mohsen Moradi - 8 May, 2017)
One of the main issues in cryptography is keeping this secret safe
Link: https://arxiv.org/abs/1705.03042
====================================================
Lightweight Robust Framework for Workload Scheduling in Clouds (Muhammed Abdulazeez - 7 May, 2017)
Our framework for robust workload scheduling efficiently combines classic fault-tolerant and security tools, such as packet/job scanning, with workload scheduling, and it does not use any heavy resource-consuming tools, e.g., cryptography or non-linear optimization
Link: https://arxiv.org/abs/1705.02671
====================================================
Quantum Security of Cryptographic Primitives (Tommaso Gagliardoni - 5 May, 2017)
This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution).
Link: https://arxiv.org/abs/1705.02417
====================================================
Verification of STAR-Vote and Evaluation of FDR and ProVerif (Murat Moran - 1 May, 2017)
We present the first automated privacy analysis of STAR-Vote, a real world voting system design with sophisticated "end-to-end" cryptography, using FDR and ProVerif
Link: https://arxiv.org/abs/1705.00782
====================================================
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments (Carmela Troncoso - 28 June, 2017)
We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful privacy-preserving decentralized systems.
Link: https://arxiv.org/abs/1704.08065
====================================================
Post-Quantum Cryptography: S381 Cyclic Subgroup of High Order (Pedro Hecht - 24 April, 2017)
Currently there is an active Post-Quantum Cryptography (PQC) solutions search, which attempts to find cryptographic protocols resistant to attacks by means of for instance Shor polynomial time algorithm for numerical field problems like integer factorization (IFP) or the discrete logarithm (DLP)
Link: https://arxiv.org/abs/1704.07238
====================================================
Remote Document Encryption - encrypting data for e-passport holders (Eric R. Verheul - 9 June, 2017)
Our results ironically suggest that carrying a passport when traveling abroad might violate export or import laws on strong cryptography.
Link: https://arxiv.org/abs/1704.05647
====================================================
A New Steganographic Technique Matching the Secret Message and Cover image Binary Value (G. Umamaheswari - 9 April, 2017)
In contrast to cryptography, Steganography provides complete secrecy of the communication. Security of very sensitive data can be enhanced by combining cryptography and steganography
Link: https://arxiv.org/abs/1704.02698
====================================================
Towards Attack-Tolerant Networks: Concurrent Multipath Routing and the Butterfly Network (Edward L. Platt - 7 April, 2017)
In the case of communication networks, such attacks can leave users vulnerable to censorship and surveillance, even when cryptography is used
Link: https://arxiv.org/abs/1704.02426
====================================================
Using Echo State Networks for Cryptography (Rajkumar Ramamurthy - 4 April, 2017)
We make use of this property to realize a novel neural cryptography scheme
Link: https://arxiv.org/abs/1704.01046
====================================================
Secure and Privacy-Preserving Average Consensus (Minghao Ruan - 19 September, 2017)
By leveraging homomorphic cryptography, our approach can guarantee consensus to the exact value in a deterministic manner
Link: https://arxiv.org/abs/1703.09364
====================================================
Impossibility of Three Pass Protocol using Public Abelian Groups (Cansu Betin Onur - 17 March, 2017)
If it were possible to employ public Abelian groups to implement the three-pass protocol, we could use it in post-quantum cryptography for transporting keys providing information theoretic security without relying on any computationally difficult problem.
Link: https://arxiv.org/abs/1703.06179
====================================================
Security in Automotive Networks: Lightweight Authentication and Authorization (Philipp Mundhenk - 15 March, 2017)
Cryptography is widely used to authenticate communicating parties and provide secure communication channels (e.g., Internet communication). In particular, asymmetric cryptography is computationally infeasible during vehicle operation.
Link: https://arxiv.org/abs/1703.03652
====================================================
Collusion-resistant and privacy-preserving P2P multimedia distribution based on recombined fingerprinting (David MegÃas - 3 March, 2017)
In addition, the proposed method avoids the use of public-key cryptography for the multimedia content and expensive cryptographic protocols, leading to excellent performance in terms of both computational and communication burdens
Link: https://arxiv.org/abs/1703.01348
====================================================
On squares of cyclic codes (Ignacio Cascudo - 12 September, 2018)
Squares of codes have gained attention for several applications mainly in the area of cryptography, and typically in those applications one is concerned about some of the parameters (dimension, minimum distance) of both $C^{*2}$ and $C$
Link: https://arxiv.org/abs/1703.01267
====================================================
Identification of image source using serialnumber-based watermarking under Compressive Sensing conditions (Andjela Draganic - 1 March, 2017)
This paper proposes a procedure for the identification of the image source and content by using the Public Key Cryptography Signature (PKCS)
Link: https://arxiv.org/abs/1703.00383
====================================================
New constructions of MDS codes with complementary duals (Bocong Chen - 24 February, 2017)
It is recently found that LCD codes can be applied in cryptography
Link: https://arxiv.org/abs/1702.07831
====================================================
Mathematical Backdoors in Symmetric Encryption Systems - Proposal for a Backdoored AES-like Block Cipher (Arnaud Bannier - 21 February, 2017)
A challenge will be proposed to the cryptography community soon
Link: https://arxiv.org/abs/1702.06475
====================================================
Connecting the Dots: Privacy Leakage via Write-Access Patterns to the Main Memory (Tara Merin John - 17 June, 2017)
In this work, we demonstrate an actual attack on power-side-channel resistant Montgomery's ladder based modular exponentiation algorithm commonly used in public key cryptography
Link: https://arxiv.org/abs/1702.03965
====================================================
Post-Quantum Cryptography(PQC): Generalized ElGamal Cipher over GF(251^8) (Pedro Hecht - 12 February, 2017)
Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols resistant to attacks by means of for instance Shor's polynomial time algorithm for numerical field problems like integer factorization (IFP) or the discrete logarithm (DLP)
Link: https://arxiv.org/abs/1702.03587
====================================================
Statistical Decoding (Thomas Debris-Alazard - 8 February, 2017)
The security of code-based cryptography relies primarily on the hardness of generic decoding with linear codes
Link: https://arxiv.org/abs/1701.07416
====================================================
A Hybrid DOS-Tolerant PKC-Based Key Management System for WSNs (Hamzeh Ghasemzadeh - 19 January, 2017)
Security is a critical and vital task in wireless sensor networks, therefore different key management systems have been proposed, many of which are based on symmetric cryptography. On the other hand, systems based on public key cryptography have those desirable characteristics, but they consume more energy
Link: https://arxiv.org/abs/1701.05608
====================================================
Succinct Hitting Sets and Barriers to Proving Algebraic Circuits Lower Bounds (Michael A. Forbes - 22 July, 2018)
However, unlike the boolean setting, there has been no concrete evidence demonstrating that this is a barrier to obtaining super-polynomial lower bounds for general algebraic circuits, as there is little understanding whether algebraic circuits are expressive enough to support "cryptography" secure against algebraic circuits.
Link: https://arxiv.org/abs/1701.05328
====================================================
Security of Electronic Payment Systems: A Comprehensive Survey (Siamak Solat - 17 January, 2017)
The evaluation of the Card-not-present transactions approaches including 3D Secure, 3D SET, SET/EMV and EMV/CAP, the impact of concept of Tokenization and the role of Blind Signatures schemes in electronic cash and E-payment systems, use of quantum key distribution (QKD) in electronic payment systems to achieve unconditional security rather than only computational assurance of the security level by using traditional cryptography, the evaluation of Near Field Communication (NFC) and the contactless payment systems such as Google wallet, Android Pay and Apple Pay, the assessment of the electronic currency and peer to peer payment systems such as Bitcoin
Link: https://arxiv.org/abs/1701.04556
====================================================
Study and Development of a Symmetric protocol to secure communications in WSN (Yassine Maleh - 2 January, 2017)
Then we proposed a new lightweight cryptography algorithm for identifying compromised node in WSN called Leap Enhanced. Our evaluations on TOSSIM give a precise and detailed idea of the extra cost of consumption of resources needed to ensure the high level of expected security compared to other cryptography schemes in literature.
Link: https://arxiv.org/abs/1701.00401
====================================================
Study and Development of a New Symmetric Key Management Scheme for Wireless Sensor Networks (Yassine Maleh - 31 December, 2016)
In this paper, we proposed a new lightweight cryptography algorithm based on LEAP+
Link: https://arxiv.org/abs/1701.00159
====================================================
LWE from Non-commutative Group Rings (Qi Cheng - 21 June, 2017)
The Ring Learning-With-Errors (LWE) problem, whose security is based on hard ideal lattice problems, has proven to be a promising primitive with diverse applications in cryptography
Link: https://arxiv.org/abs/1612.06670
====================================================
Lightweight compression with encryption based on Asymmetric Numeral Systems (Jarek Duda - 14 December, 2016)
Therefore, there is growing demand for finding trade-offs between security, cost and performance in lightweight cryptography
Link: https://arxiv.org/abs/1612.04662
====================================================
Design and Evaluation of Alternate Enumeration Techniques for Subset Sum Problem (Avni Verma - 12 December, 2016)
SSP has its applications in broad domains like cryptography, number theory, operation research and complexity theory
Link: https://arxiv.org/abs/1612.01693
====================================================
The Optimality of Correlated Sampling (Mohammad Bavarian - 3 December, 2016)
This protocol has been used in several different contexts including sketching algorithms, approximation algorithms based on rounding linear programming relaxations, the study of parallel repetition and cryptography.
Link: https://arxiv.org/abs/1612.01041
====================================================
A Technique to Share Multiple Secret Images (Mohit Rajput - 28 November, 2016)
Visual Cryptography comes under cryptography domain. It deals with encrypting and decrypting of visual information like pictures, texts, videos $ etc.$ Multi Secret Image Sharing (MSIS) scheme is a part of visual cryptography that provides a protected method to transmit more than one secret images over a communication channel
Link: https://arxiv.org/abs/1611.09261
====================================================
Cryptanalysis of Xinyu et al.'s NTRU-Lattice Based Key Exchange Protocol (Maheswara Rao Valluri - 26 November, 2016)
proposed a public key exchange protocol, which is based on the NTRU-lattice based cryptography
Link: https://arxiv.org/abs/1611.08686
====================================================
An Integrated approach for the Secure Transmission of Images based on DNA Sequences (Grasha Jacob - 24 November, 2016)
DNA sequences play a vital role in modern cryptography and DNA sequence based cryptography renders a helping hand for transmission of such confidential images over a public insecure channel as the intended recipient alone can decipher them
Link: https://arxiv.org/abs/1611.08252
====================================================
SROS: Securing ROS over the wire, in the graph, and through the kernel (Ruffin White - 21 November, 2016)
SROS is a proposed addition to the ROS API and ecosystem to support modern cryptography and security measures. An overview of current progress will be presented, rationalizing each major advancement, including: over-the-wire cryptography for all data transport, namespaced access control enforcing graph policies/restrictions, and finally process profiles using Linux Security Modules to harden a node's resource access
Link: https://arxiv.org/abs/1611.07060
====================================================
Optimal Key Consensus in Presence of Noise (Zhengzhong Jin - 6 October, 2017)
KC and AKC are fundamental to lattice based cryptography, in the sense that a list of cryptographic primitives based on LWR, LWE and RLWE (including key exchange, public-key encryption, and more) can be modularly constructed from them
Link: https://arxiv.org/abs/1611.06150
====================================================
Bounds for the $l_1$-distance of $q$-ary lattices obtained via Constructions D, D$^{'}$ and $\overline{D}$ (Eleonesio Strey - 1 November, 2016)
Lattices have been used in several problems in coding theory and cryptography
Link: https://arxiv.org/abs/1611.00435
====================================================
RSA algorithm with a new approach encryption and decryption message text by ascii (Ahmad Steef - 9 January, 2016)
In many research works, there has been an orientation to studying and developing many of the applications of public-key cryptography to secure the data while transmitting in the systems, In this paper we present an approach to encrypt and decrypt the message text according to the ASCII(American Standard Code for Information Interchange) and RSA algorithm by converting the message text into binary representation and dividing this representation to bytes(8s of 0s and 1s) and applying a bijective function between the group of those bytes and the group of characters of ASCII and then using this mechanism to be compatible with using RSA algorithm, finally, Java application was built to apply this approach directly.
Link: https://arxiv.org/abs/1610.08832
====================================================
Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems (Rens W. van der Heijden - 21 October, 2016)