cryptography 2021
High-assurance cryptography in the spectre era
free download
High-assurance cryptography leverages methods from program verification and cryptography engineering to deliver efficient cryptographic software with machine-checked proofs of memory safety, functional correctness, provable security, and absence of timing
SoK: How (not) to Design and Implement Post-Quantum Cryptography .
free download
Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel resistant embedded implementations, large scale
On the Possibility of Basing Cryptography on \EXP≠\BPP.
free download
Abstract Liu and Pass (FOCS20) recently demonstrated an equivalence between the existence of oneway functions (OWFs) and mild average-case hardness of the time- bounded Kolmogorov complexity problem. In this work, we establish a similar equivalence
Combined Fault and DPA Protection for Lattice-Based Cryptography .
free download
The progress on constructing quantum computers and the ongoing standardization of post- quantum cryptography (PQC) have led to the development and refinement of promising new digital signature schemes and key encapsulation mechanisms (KEM). Especially lattice
Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography .
free download
Side-channel attacks can break mathematically secure cryptographic systems leading to a major concern in applied cryptography . While the cryptanalysis and security evaluation of Post-Quantum Cryptography (PQC) have already received an increasing research effort, a
Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography .
free download
In this work, we are concerned with the hardening of post-quantum key encapsulation mechanisms (KEM) against side-channel attacks, with a focus on the comparison operation required for the Fujisaki-Okamoto (FO) transform. We identify critical vulnerabilities in two
High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography
free download
This paper demonstrates an architecture for accelerating the polynomial multiplication using number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST post-quantum cryptography standardization process. Simultaneously, the performance of
Abstract Modeling of Systems Communication in Constructive Cryptography Using CryptHOL
free download
Proofs in simulation-based frameworks have the greatest rigor when they are machine checked. But the level of details in these proofs surpasses what the formal-methods community can handle with existing tools. Existing formal results consider streamlined
Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation
free download
Lightweight Cryptography (LWC) is widely used to provide integrity, secrecy and authentication for the sensitive applications. However, the LWC is vulnerable to various constraints such as high-power consumption, time consumption, and hardware utilization
Disappearing Cryptography in the Bounded Storage Model.
free download
In this work, we study disappearing cryptography in the bounded storage model. Here, a component of the transmission, say a ciphertext, a digital signature, or even a program, is streamed bit by bit. The stream is so large for anyone to store in its entirety, meaning the
Cryptography on Isogeny Graphs
free download
L Pannyyx7.cc The cover shows the famous th-century woodblock print The Great Wave off Kanagawa () by Japanese artist Hokusai (, c. ). It symbolizes mankinds everlasting struggle against the forces of nature, which bears similarity to the way the laws of mathematics and physics
Quantum Cryptography : The Future of Internet and Security Analysis
free download
In todays world, the cryptography techniques are used and implemented on the elementary method of finding the prime factor of large integer, which is said to be Inevitable to Track . But living in an era where nothing is impossible to achieve, so cryptography techniques are
Elliptic curve cryptography
free download
When sending a message online, how do we make sure that the message is not intercepted and read by a third party Cryptography is the study and practice of techniques to keep communication secure from being accessed by third parties In this paper, we discuss how elliptic curves
Adaptively Secure Broadcast in Resource-Restricted Cryptography
free download
The advent of blockchain protocols has reignited the interest in adaptively secure broadcast, as it is by now well known that broadcasting over a diffusion network allows an adaptive adversary to corrupt the sender depending on the message s/he attempts to send and
Quantum Cryptography : A way of Improving Security of Information
free download
The main challenge in the current era is how to secure the communication networks on which the information is transmitted from source to destination. Different techniques and algorithms are used for securing the communication system and providing a more secure Quantum computing is not a far-fetched reality. The mathematical model of quantum computing was first proposed by Feynman [18], but the practical implementation has still engineering limitations pertaining to cryogenics. IBM has come up with its small quantum
Asymmetric Key Cryptography based Ad-hoc on Demand Distance Vector Protocol (AC-AODV)
free download
Disaster is sudden, catastrophic events which origins are natural calamities and man-made, cause greater loss, damage and destruction of life and property. Since there are several geographical areas in the globe in which natural calamities such as flood, earthquake
A Survey of Public-Key Cryptography over Non-Abelian Groups
free download
Non-abelian group based Cryptography is a field which has become a latest trend in research due to increasing vulnerabilities associated with the abelian group based cryptosystems which are in use at present and the interesting algebraic propertiesIn Page 40 the references . King Jon, Differential Cryptanalysis Tutorial. Available online: http://www. theamazingking. com/crypto-diff. php. . King Jon, Linear Cryptanalysis Tutorial. Available online: http://www. theamazingking. com/crypto-linear. php. , has been It is highly required to secure the video data uploaded on the web cloud serves. Video cryptography (VC) hides the crypto security key on the cipher image on secure images (SI). Video is as sequence of the unsystematic images or frames. Thus, video security is a real In todays world, simply having the capacity to transfer a file from one location to another isnt enough. Businesses today face multiple security threats and a highly competitive environment. So they need a secure file transfer system to protect and reliably transfer their
Learning, Space, and Cryptography
free download
This is our final project for CS 221 (Computational Complexity), an expository report on [Raz17], which gives samples-space lower bounds (and a fortiori time-space lower bounds) for a broad class of learning problems. Specifically, it is shown that if we consider the
Joint Cryptography and Channel-Coding Based on Low-Density Parity-Check Codes and Advanced Encryption Standard for 5G systems
free download
Security and reliability issues have always been a big challenge in digital communications. With the emerging 5G technologies, new requirements are introduced where latency reduction is one of the most important. In this paper, a joint security and reliability method is
Algebraic Structural Application of Finite Field () in Cryptography
free download
Cryptography is the science which associates with the process of converting plain text information into cipher text and vice-versa. Data security concerned cryptography plays vital role in confidentiality, reliability and authenticity in data transmission through public network
Group Structure in Correlations and its Applications in Cryptography
free download
Correlated random variables are a key tool in cryptographic applications like secure multiparty computation. We investigate the power of a class of correlations that we term group correlations: A group correlation is a uniform distribution over pairs (x, y)∈ G2 such
Analysis of Tools and Techniques in cryptography
free download
In the epoch of advanced electronic and communication systems, it is being observed most of the times that the information is being assaulted with worms and viruses. To shield the data, a secure and sophisticated cryptosystem is required to devoid any type of dilemma
Post-Quantum Cryptography : Cryptanalysis and Implementation
free download
Post-quantum cryptography is the field of study and development of cryptographic primitives providing security in the presence of adversaries capable of running large-scale error- tolerant quantum computations. Works in this area span from theoretical analysis of security
Isogenies on public-key cryptography = Isogenias en criptografía de llave pública
free download
La criptografıa es la práctica y estudio de t cnicas para asegurar las comunicaciones en presencia de terceras personas llamadas adversarios. La criptografıa toma como base problemas computacionalmente difıciles para proveer servicios como autenticación
Study and improved data storage in cloud computing using cryptography
free download
Cloud computing is becoming a powerful network architecture to perform computing that is both large and complex. We present a cloud computing survey which outlines its core concepts, architectural principles, state-of-the art deployment and research challenges. Due
On the Effect of Projection on Rank Attacks in Multivariate Cryptography
free download
The multivariate scheme HFEv-used to be considered a promising candidate for a post- quantum signature system. First suggested in the early 2000s, a version of the scheme made it to the third round of the ongoing NIST post-quantum standardization process. In late Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder
Introduction to Multivariate Cryptography
free download
RSA is based on Number Theory (Modular Arithmetic). In RSA, each user has a secret key sk=(p, q, d) consisting of two large prime numbers p, q and an integer d (computed in terms of p, q); and a public key pk=(n, e) consisting of n= pq and an integer e (computed also in
Neural network biometric cryptography system
free download
In this paper, an approach to the construction of a neural network system of biometric authentication is proposed, which allows organizing the distributed stor-age of the base of biometric images and using a secret cryptographic key generated on the basis of the input
Constructive Cryptography in HOL: the Communication Modeling Aspect
free download
Abstract Constructive Cryptography (CC)[ 9] introduces an abstract approach to composable security statements that allows one to focus on a particular aspect of security proofs at a time. Instead of proving the properties of concrete systems, CC studies system
Cryptanalysis and Modification of Certificateless Blind Signature Scheme using Elliptic Curve Cryptography
free download
Blind signatures provide authenticity, integrity, nonrepudiation, blindness and untraceability of the message contents. In blind signature, the signer signs the message without revealing the contents of a message. Certificateless blind signature scheme is the combination of
ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process
free download
This report presents area, throughput, and energy results for synthesizing the NIST Lightweight Cryptography Round 2 candidates on five ASIC cell libraries using two different synthesis tool suites. This report is the ASIC complement to the data in the FPGA
SAFE AND SOUND INFORMATION CONTRIBUTION WITHIN MULTI CLOUD SURROUNDINGS BASED ON CRYPTOGRAPHY
free download
Information respectability and information privacy are 2 significant prerequisites for open cloud climate. Cloud computing has arisen as a long-envisioned vision of the utility figuring worldview which gives dependable and versatile framework to clients to distantly
LIGHTWEIGHT CRYPTOGRAPHY ALGORITHMS FOR POINTS ADDITION AND POINT DOUBLING ON JACOBI ELLIPTIC CURVES USING ANCIENT
free download
This paper includes lightweight cryptography efficient algorithms for point additions and point doubling on Jacobi elliptic curve using Ancient Mathematics Techniques (AMT). AMT reduces the time complexity occurring in point doubling and point addition in Jacobi elliptic
Applying Neural Networks to Cryptography
free download
This paper is small part that investigates about methods involved in encryption of data by using cryptographic methods for cell phones and smart devices, by utilizing neural systems method. This is considered as the major problem because of increased in usage of mobileFace Recognition is used for real time application. So reliability is the more important matter for security. Facial Recognition is rapidly becoming area of interest. Face biometrics is useful for authentication that recognizes face. This paper represents secured face recognition