A survey of consensus algorithms in public blockchain systems for crypto-currencies
In recent years, crypto-currencies (a form of decentralised digital currencies) have been
quite popular as an alternative form of payments. They are underpinned by a breakthrough …
quite popular as an alternative form of payments. They are underpinned by a breakthrough …
Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …
Post-quantum key {Exchange—A} new hope
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …
A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
healthcare systems more efficient than before. Modern healthcare devices can monitor and …
Blockchain consensus algorithms: A survey
In recent years, blockchain technology has received unparalleled attention from academia,
industry, and governments all around the world. It is considered a technological …
industry, and governments all around the world. It is considered a technological …
Post-quantum cryptography
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …
medical devices. However, many commonly used cryptosystems will be completely broken …
Speeding up the number theoretic transform for faster ideal lattice-based cryptography
Abstract The Number Theoretic Transform (NTT) provides efficient algorithms for cyclic and
nega-cyclic convolutions, which have many applications in computer arithmetic, eg, for …
nega-cyclic convolutions, which have many applications in computer arithmetic, eg, for …
Lightweight cryptography methods
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
Implementation and practical problems of chaos-based cryptography revisited
Chaos-based cryptography, since its inception, has become a widely published subject.
Despite the vast amount of contributions in the area, its applications in real-world scenarios …
Despite the vast amount of contributions in the area, its applications in real-world scenarios …