A survey of consensus algorithms in public blockchain systems for crypto-currencies

MS Ferdous, MJM Chowdhury, MA Hoque - Journal of Network and …, 2021 - Elsevier
In recent years, crypto-currencies (a form of decentralised digital currencies) have been
quite popular as an alternative form of payments. They are underpinned by a breakthrough …

Post-quantum lattice-based cryptography implementations: A survey

H Nejatollahi, N Dutt, S Ray, F Regazzoni… - ACM Computing …, 2019 - dl.acm.org
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …

Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices

Q Wang, D Wang, C Cheng… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Smart-card based password authentication has been the most widely used two-factor
authentication (2FA) mechanism for security-critical applications (eg, e-Health, smart grid …

Post-quantum key {Exchange—A} new hope

E Alkim, L Ducas, T Pöppelmann… - 25th USENIX Security …, 2016 - usenix.org
At IEEE Security & Privacy 2015, Bos, Costello, Naehrig, and Stebila proposed an
instantiation of Peikert's ring-learning-with-errors–based (Ring-LWE) key exchange protocol …

A survey on security and privacy issues in modern healthcare systems: Attacks and defenses

AKMI Newaz, AK Sikder, MA Rahman… - ACM Transactions on …, 2021 - dl.acm.org
Recent advancements in computing systems and wireless communications have made
healthcare systems more efficient than before. Modern healthcare devices can monitor and …

Blockchain consensus algorithms: A survey

MS Ferdous, MJM Chowdhury, MA Hoque… - arxiv preprint arxiv …, 2020 - arxiv.org
In recent years, blockchain technology has received unparalleled attention from academia,
industry, and governments all around the world. It is considered a technological …

Post-quantum cryptography

DJ Bernstein, T Lange - Nature, 2017 - nature.com
Cryptography is essential for the security of online communication, cars and implanted
medical devices. However, many commonly used cryptosystems will be completely broken …

Speeding up the number theoretic transform for faster ideal lattice-based cryptography

P Longa, M Naehrig - Cryptology and Network Security: 15th International …, 2016 - Springer
Abstract The Number Theoretic Transform (NTT) provides efficient algorithms for cyclic and
nega-cyclic convolutions, which have many applications in computer arithmetic, eg, for …

Lightweight cryptography methods

WJ Buchanan, S Li, R Asif - Journal of Cyber Security Technology, 2017 - Taylor & Francis
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …

Implementation and practical problems of chaos-based cryptography revisited

JS Teh, M Alawida, YC Sii - Journal of Information Security and Applications, 2020 - Elsevier
Chaos-based cryptography, since its inception, has become a widely published subject.
Despite the vast amount of contributions in the area, its applications in real-world scenarios …