Security and Communication Networks

Applied Cryptography and Noise Resistant Data Security


Publishing date
01 Mar 2018
Status
Published
Submission deadline
03 Nov 2017

Lead Editor

1Qatar University, Doha, Qatar

2Gwinnett Tech, Georgia, USA

3La Trobe University, Melbourne, Australia

4HITEC University, Taxila, Pakistan


Applied Cryptography and Noise Resistant Data Security

Description

This journal seeks original manuscripts in English for a special issue scheduled to appear in the June issue of 2018. This journal is an international journal publishing original research and review papers on all security areas including network security, cryptography, and cybersecurity.

There have been tremendous efforts exerted in the field of cryptography by mathematicians and computer scientists. However, at the same time, there are security concerns that still have to be properly addressed. Also, for cipher to be secure and robust, the power constraints should also be considered. Moreover, one critical requirement for a modern cipher is to be distortion tolerant; the distortion can be inserted intentionally by an unauthenticated user or can be unintentionally caused by a wireless channel.

The goal followed in this special issue is to create a volume of recent work on advances in all aspects of cryptography, especially towards those ciphers which can tolerate channel noise.

Potential topics include but are not limited to the following:

  • Noise resistant cryptography
  • Lightweight cryptography
  • Public key cryptography
  • Efficient implementation of cryptographic algorithms
  • Computational number theory
  • Cryptanalytic attacks
  • Side-channel attacks
  • Data hiding
  • Authentication
  • Key management
  • Multiparty computation
  • Quantum-safe cryptography
  • Symmetric cryptography
  • Pairing based cryptography
  • Pseudo-random sequences
  • Cryptographic protocols
  • Cryptanalysis
  • Security applications
  • Privacy
  • Public key infrastructure
  • Zero knowledge proofs
  • Untraceability

Articles

  • Special Issue
  • - Volume 2018
  • - Article ID 3962821
  • - Editorial

Applied Cryptography and Noise Resistant Data Security

Iqtadar Hussain | Fawad Ahmed | ... | Amir Anees
  • Special Issue
  • - Volume 2018
  • - Article ID 2029869
  • - Research Article

High Embedding Capacity Data Hiding Algorithm for H.264/AVC Video Sequences without Intraframe Distortion Drift

Dinh-Chien Nguyen | Thai-Son Nguyen | ... | Fang-Rong Hsu
  • Special Issue
  • - Volume 2018
  • - Article ID 1840207
  • - Research Article

A Robust Watermarking Scheme for Online Multimedia Copyright Protection Using New Chaotic Map

Amir Anees | Iqtadar Hussain | ... | Muhammad Aslam
  • Special Issue
  • - Volume 2018
  • - Article ID 4983404
  • - Research Article

A Vendor-Neutral Unified Core for Cryptographic Operations in GF(p) and GF() Based on Montgomery Arithmetic

Martin Schramm | Reiner Dojen | Michael Heigl
  • Special Issue
  • - Volume 2018
  • - Article ID 2483619
  • - Research Article

A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism

Ye Yuan | Liji Wu | ... | Xiangmin Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 3578942
  • - Research Article

An Efficient Certificateless Generalized Signcryption Scheme

Bo Zhang | Zhongtian Jia | Chuan Zhao
  • Special Issue
  • - Volume 2018
  • - Article ID 5967635
  • - Research Article

LWR-Based Fully Homomorphic Encryption, Revisited

Fucai Luo | Fuqun Wang | ... | Kefei Chen
  • Special Issue
  • - Volume 2018
  • - Article ID 5823230
  • - Research Article

To Study the Effect of the Generating Polynomial on the Quality of Nonlinear Components in Block Ciphers

Shahid Mahmood | Shabieh Farwa | ... | Sajjad Shaukat Jamal
  • Special Issue
  • - Volume 2018
  • - Article ID 9701756
  • - Research Article

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9

Qi Zhang | An Wang | ... | Liehuang Zhu
  • Special Issue
  • - Volume 2018
  • - Article ID 7206835
  • - Research Article

Analysis of Software Implemented Low Entropy Masking Schemes

Dan Li | Jiazhe Chen | ... | Xiaoyun Wang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.