cryptography 2021



High-assurance cryptography in the spectre era
free download

High-assurance cryptography leverages methods from program verification and cryptography engineering to deliver efficient cryptographic software with machine-checked proofs of memory safety, functional correctness, provable security, and absence of timing

SoK: How (not) to Design and Implement Post-Quantum Cryptography .
free download

Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel resistant embedded implementations, large scale

On the Possibility of Basing Cryptography on \EXP≠\BPP.
free download

Abstract Liu and Pass (FOCS20) recently demonstrated an equivalence between the existence of oneway functions (OWFs) and mild average-case hardness of the time- bounded Kolmogorov complexity problem. In this work, we establish a similar equivalence

Combined Fault and DPA Protection for Lattice-Based Cryptography .
free download

The progress on constructing quantum computers and the ongoing standardization of post- quantum cryptography (PQC) have led to the development and refinement of promising new digital signature schemes and key encapsulation mechanisms (KEM). Especially lattice

Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography .
free download

Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography . While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research effort, a

Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography .
free download

In this work, we are concerned with the hardening of post-quantum key encapsulation mechanisms (KEM) against side-channel attacks, with a focus on the comparison operation required for the Fujisaki-Okamoto (FO) transform. We identify critical vulnerabilities in two

High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
free download

This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously, the performance of

Abstract Modeling of Systems Communication in Constructive Cryptography Using CryptHOL
free download

Proofs in simulation-based frameworks have the greatest rigor when they are machine checked. But the level of details in these proofs surpasses what the formal-methods community can handle with existing tools. Existing formal results consider streamlined

Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation
free download

Lightweight Cryptography (LWC) is widely used to provide integrity, secrecy and authentication for the sensitive applications. However, the LWC is vulnerable to various constraints such as high-power consumption, time consumption, and hardware utilization

Disappearing Cryptography in the Bounded Storage Model.
free download

In this work, we study disappearing cryptography in the bounded storage model. Here, a component of the transmission, say a ciphertext, a digital signature, or even a program, is streamed bit by bit. The stream is so large for anyone to store in its entirety, meaning the

Cryptography on Isogeny Graphs
free download

L Pannyyx7.cc The cover shows the famous th-century woodblock print The Great Wave off Kanagawa () by Japanese artist Hokusai (, c. ). It symbolizes mankinds everlasting struggle against the forces of nature, which bears similarity to the way the laws of mathematics and physics

Quantum Cryptography : The Future of Internet and Security Analysis
free download

In todays world, the cryptography techniques are used and implemented on the elementary method of finding the prime factor of large integer, which is said to be Inevitable to Track . But living in an era where nothing is impossible to achieve, so cryptography techniques are

Elliptic curve cryptography
free download

When sending a message online, how do we make sure that the message is not intercepted and read by a third party Cryptography is the study and practice of techniques to keep communication secure from being accessed by third parties In this paper, we discuss how elliptic curves

Adaptively Secure Broadcast in Resource-Restricted Cryptography
free download

The advent of blockchain protocols has reignited the interest in adaptively secure broadcast, as it is by now well known that broadcasting over a diffusion network allows an adaptive adversary to corrupt the sender depending on the message s/he attempts to send and

Quantum Cryptography : A way of Improving Security of Information
free download

The main challenge in the current era is how to secure the communication networks on which the information is transmitted from source to destination. Different techniques and algorithms are used for securing the communication system and providing a more secure Quantum computing is not a far-fetched reality. The mathematical model of quantum computing was first proposed by Feynman [18], but the practical implementation has still engineering limitations pertaining to cryogenics. IBM has come up with its small quantum

Asymmetric Key Cryptography based Ad-hoc on Demand Distance Vector Protocol (AC-AODV)
free download

Disaster is sudden, catastrophic events which origins are natural calamities and man-made, cause greater loss, damage and destruction of life and property. Since there are several geographical areas in the globe in which natural calamities such as flood, earthquake

A Survey of Public-Key Cryptography over Non-Abelian Groups
free download

Non-abelian group based Cryptography is a field which has become a latest trend in research due to increasing vulnerabilities associated with the abelian group based cryptosystems which are in use at present and the interesting algebraic propertiesIn Page 40 the references . King Jon, Differential Cryptanalysis Tutorial. Available online: http://www. theamazingking. com/crypto-diff. php. . King Jon, Linear Cryptanalysis Tutorial. Available online: http://www. theamazingking. com/crypto-linear. php. , has been It is highly required to secure the video data uploaded on the web cloud serves. Video cryptography (VC) hides the crypto security key on the cipher image on secure images (SI). Video is as sequence of the unsystematic images or frames. Thus, video security is a real In todays world, simply having the capacity to transfer a file from one location to another isnt enough. Businesses today face multiple security threats and a highly competitive environment. So they need a secure file transfer system to protect and reliably transfer their

Learning, Space, and Cryptography
free download

This is our final project for CS 221 (Computational Complexity), an expository report on [Raz17], which gives samples-space lower bounds (and a fortiori time-space lower bounds) for a broad class of learning problems. Specifically, it is shown that if we consider the

Joint Cryptography and Channel-Coding Based on Low-Density Parity-Check Codes and Advanced Encryption Standard for 5G systems
free download

Security and reliability issues have always been a big challenge in digital communications. With the emerging 5G technologies, new requirements are introduced where latency reduction is one of the most important. In this paper, a joint security and reliability method is

Algebraic Structural Application of Finite Field () in Cryptography
free download

Cryptography is the science which associates with the process of converting plain text information into cipher text and vice-versa. Data security concerned cryptography plays vital role in confidentiality, reliability and authenticity in data transmission through public network

Group Structure in Correlations and its Applications in Cryptography
free download

Correlated random variables are a key tool in cryptographic applications like secure multiparty computation. We investigate the power of a class of correlations that we term group correlations: A group correlation is a uniform distribution over pairs (x, y)∈ G2 such

Analysis of Tools and Techniques in cryptography
free download

In the epoch of advanced electronic and communication systems, it is being observed most of the times that the information is being assaulted with worms and viruses. To shield the data, a secure and sophisticated cryptosystem is required to devoid any type of dilemma

Post-Quantum Cryptography : Cryptanalysis and Implementation
free download

Post-quantum cryptography is the field of study and development of cryptographic primitives providing security in the presence of adversaries capable of running large-scale error- tolerant quantum computations. Works in this area span from theoretical analysis of security

Isogenies on public-key cryptography = Isogenias en criptografía de llave pública
free download

La criptografıa es la práctica y estudio de t cnicas para asegurar las comunicaciones en presencia de terceras personas llamadas adversarios. La criptografıa toma como base problemas computacionalmente difıciles para proveer servicios como autenticación

Study and improved data storage in cloud computing using cryptography
free download

Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-of-the art deployment and research challenges. Due

On the Effect of Projection on Rank Attacks in Multivariate Cryptography
free download

The multivariate scheme HFEv-used to be considered a promising candidate for a post- quantum signature system. First suggested in the early 2000s, a version of the scheme made it to the third round of the ongoing NIST post-quantum standardization process. In late Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder

Introduction to Multivariate Cryptography
free download

RSA is based on Number Theory (Modular Arithmetic). In RSA, each user has a secret key sk=(p, q, d) consisting of two large prime numbers p, q and an integer d (computed in terms of p, q); and a public key pk=(n, e) consisting of n= pq and an integer e (computed also in

Neural network biometric cryptography system
free download

In this paper, an approach to the construction of a neural network system of biometric authentication is proposed, which allows organizing the distributed stor-age of the base of biometric images and using a secret cryptographic key generated on the basis of the input

Constructive Cryptography in HOL: the Communication Modeling Aspect
free download

Abstract Constructive Cryptography (CC)[ 9] introduces an abstract approach to composable security statements that allows one to focus on a particular aspect of security proofs at a time. Instead of proving the properties of concrete systems, CC studies system

Cryptanalysis and Modification of Certificateless Blind Signature Scheme using Elliptic Curve Cryptography
free download

Blind signatures provide authenticity, integrity, nonrepudiation, blindness and untraceability of the message contents. In blind signature, the signer signs the message without revealing the contents of a message. Certificateless blind signature scheme is the combination of

ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
free download

This report presents area, throughput, and energy results for synthesizing the NIST Lightweight Cryptography Round 2 candidates on five ASIC cell libraries using two different synthesis tool suites. This report is the ASIC complement to the data in the FPGA

SAFE AND SOUND INFORMATION CONTRIBUTION WITHIN MULTI CLOUD SURROUNDINGS BASED ON CRYPTOGRAPHY
free download

Information respectability and information privacy are 2 significant prerequisites for open cloud climate. Cloud computing has arisen as a long-envisioned vision of the utility figuring worldview which gives dependable and versatile framework to clients to distantly

LIGHTWEIGHT CRYPTOGRAPHY ALGORITHMS FOR POINTS ADDITION AND POINT DOUBLING ON JACOBI ELLIPTIC CURVES USING ANCIENT
free download

This paper includes lightweight cryptography efficient algorithms for point additions and point doubling on Jacobi elliptic curve using Ancient Mathematics Techniques (AMT). AMT reduces the time complexity occurring in point doubling and point addition in Jacobi elliptic

Applying Neural Networks to Cryptography
free download

This paper is small part that investigates about methods involved in encryption of data by using cryptographic methods for cell phones and smart devices, by utilizing neural systems method. This is considered as the major problem because of increased in usage of mobileFace Recognition is used for real time application. So reliability is the more important matter for security. Facial Recognition is rapidly becoming area of interest. Face biometrics is useful for authentication that recognizes face. This paper represents secured face recognition