Implementing RLWE-based schemes using an RSA co-processor

MR Albrecht, C Hanser, A Hoeller… - Cryptology ePrint …, 2018 - eprint.iacr.org
We repurpose existing RSA/ECC co-processors for (ideal) lattice-based cryptography by
exploiting the availability of fast long integer multiplication. Such co-processors are …

IoT-enhanced transport and monitoring of medicine using sensors, MQTT, and secure short message service

DS Bhatti, MM Hussain, B Suh, Z Ali, I Akobir… - IEEE Access, 2024 - ieeexplore.ieee.org
Since its inception more than a decade ago, Internet of Things (IoT) technology has been
guiding people in the development of a world full of smart solutions in which all devices and …

[PDF][PDF] Black-box wallets: Fast anonymous two-way payments for constrained devices

M Hoffmann, M Klooß, M Raiber, A Rupp - Proceedings on privacy …, 2020 - orbilu.uni.lu
Black-box accumulation (BBA) is a building block which enables a privacy-preserving
implementation of point collection and redemption, a functionality required in a variety of …

Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card

R Casanova-Marqués, P Dzurenda… - Proceedings of the 17th …, 2022 - dl.acm.org
Java Card stands out as a good choice for the development of smart card applications due
to the high interoperability between different manufacturers, its security, and wide support of …

Unlinkability of an improved key agreement protocol for EMV 2nd gen payments

R Horne, S Mauw, S Yurkov - 2022 IEEE 35th Computer …, 2022 - ieeexplore.ieee.org
To address known privacy problems with the EMV standard, EMVCo have proposed a
Blinded Diffie-Hellman key establishment protocol, which is intended to be part of a future …

Provably unlinkable smart card-based payments

S Bursuc, R Horne, S Mauw, S Yurkov - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
The most prevalent smart card-based payment method, EMV, currently offers no privacy to
its users. Transaction details and the card number are sent in cleartext, enabling the profiling …

[PDF][PDF] SHINE: Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes.

A Dufka, V Sedlacek, P Svenda - SECRYPT, 2022 - scitepress.org
Secure multi-party cryptographic protocols divide the secret key among multiple devices and
never reconstruct it in a single place. Such a mechanism protects against malware, code …

Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials

P Dzurenda, R Casanova-Marqués, L Malina… - Proceedings of the 17th …, 2022 - dl.acm.org
With the daily increase in digitalization and integration of the physical and digital worlds, we
need to better protect users' privacy and identity. Attribute-based Credentials (ABCs) seem …

Performance analysis of pairing-based elliptic curve cryptography on constrained devices

J Hajny, P Dzurenda, S Ricci… - … Congress on Ultra …, 2018 - ieeexplore.ieee.org
The paper deals with the implementation aspects of the bilinear pairing operation over an
elliptic curve on constrained devices, such as smart cards, embedded devices, smart meters …

Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices

J Hajny, P Dzurenda, RC Marques… - 2020 12th International …, 2020 - ieeexplore.ieee.org
Cyber security and privacy protection play a crucial role in modern communication systems.
While it is relatively easy to secure classical networks, it is a hard problem to provide even …