We currently live in an information society. As information and communication technologies develop at an ever growing pace, the number of people who use these technologies on a day to day basis is also increasing. This development has brought substantial benefits but also introduced novel threats and vulnerabilities related to leakage of confidential information, the theft of identities and the unauthorized modification of data. This shows the need for the development of a reliable and trustworthy information infrastructure. This requires trustworthy systems which can be implemented by security technologies, and an essential building block for such systems is cryptography. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. It makes extensive use of mathematics such as number theory, probability, statistics and combinatorics as well as of information theory, computational complexity and coding theory.
The aim of this special issue is to foster state-of-the-art research in the area of cryptography and security technologies. This special issue focuses on advances in cryptography and security technologies based on computer mathematics. Topics of primary interest include, but are not limited to:
Authentication and access control
Anonymity, identity management
Cryptographic protocols
Data integrity, dependability
Digital right management and intellectual property protection
Accountability
Applied cryptography
Mathematical and algorithmic foundations of applied cryptography
Design and analysis of cryptographic algorithms and protocols
Information security with mathematical emphasis
Side channel attack
Algebraic attack
Cybercrime and computer forensics
Denial of service attacks
Formal methods in security
Information warfare
Steganography and watermarking
Intrusion tolerance
System and network security
Multimedia security
Smartphone security issues
Security for open convergence system
Security for machine-to-machine (M2M) platform
Security and privacy issues for intelligent vehicular systems and communications
Security issues for broadband convergence network
Internet protocol television (IPTV) security services
Privacy-enhancing technology
Security evaluation and management
Security requirements engineering
trust models and trust management policies
Mobile trusted computing
Trustworthy infrastructures and services for cloud computing
Cryptographic aspects of trusted computing
Establishing trust in embedded systems
Virtualization for trusted platforms
Verification of trusted computing architectures
We received many manuscripts. Each manuscript was blind reviewed by at least three reviewers consisting of guest editors and external reviewers. After the review process, the following nine manuscripts were finally selected for this Special Issue.
Two-factor authentication system based on extended OTP mechanism, Yunlim Ku, Okkyung Choi, Kangseok Kim, Taeshik Shon, Manpyo Hong, Hongjin Yeh, Jai-Hoon Kim [Citation1].
Elastic password authentication scheme using the Passcell-based virtual scroll wheel, Hyunyi Yi, Siwan Kim, Gunil Ma, Jeong Hyun Yi [Citation8].
Modelling and simulations for DDoS attacks mitigation in identifier–locator split network, Ying Liu, Yang Sun Lee, Hong-Ke Zhang, Tin-Yu Wu, Chi-Hsiang Lo [Citation4].
Improved differential fault analysis on PRESENT-80/128, Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong [Citation3].
Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo, Jung-Hwan Song, Kwanhyung Lee, Hwanjin Lee [Citation6].
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi [Citation9].
A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform, Ming-Quan Fan, Pei-Pei Liu, Hong-Xia Wang, Heng-Jian Li [Citation2].
New forward-secure public-key encryption without random oracles, Yang Lu, Jiguo Li [Citation5].
The design of speedy seamless safe messaging mechanism in VANET, Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan [Citation7].
Finally, we would like to thank all authors for their contributions to this special issue. We also extend our thanks to the following external reviewers for their excellent job in reviewing the manuscripts: Al Mahmoud, Aleksandar Kircanski, Carles Padro, Changhoon Lee, Changqiao Xu, Chen-Mou Cheng, Chia-Long Wu, Ching-Yu Yang, Christian Praher, Dawen Xu, Dukjae Moon, Fangguo Zhang, Geong Seng Poh, Haifeng Qian, Hodjat Hamidi, Hsiang-Cheh Huang, Jaeduck Choi, Jason Crampton, Jingsha He, Junfeng Shi, Karim Afshar, Chun-Li Lin, LingLing An, Mahesh V. Tripunitara, Marko Holbl, Minkyung Kim, Min-Shiang Hwang, Mun-Kyu Lee, Nele Mentens, R. Bobba, Sejin Oh, Shijun Xiang, Tsu-Yang Wu, Wei-Chen Wu, Wun-She Yap, Xiaoping Xue, Yong Yu, Yongjin Yeom, Yongquan Cui.
References
- Y. Ku, O. Choi, K. Kim, T. Shon, M. Hong, H. Yeh, and J.-H. Kim, Two-factor authentication system based on extended OTP mechanism, Int. J. Comput. Math. 90 (12) (2013), pp. 2512–2529.
- M.-Q. Fan, P.-P. Liu, H.-X. Wang, and H.-J. Li, A semi-fragile watermarking scheme for authenticating audio signal based on dual-tree complex wavelet transform and discrete cosine transform, Int. J. Comput. Math. 90 (12) (2013), pp. 2588–2602.
- K. Jeong, Y. Lee, J. Sung, and S. Hong, Improved differential fault analysis on PRESENT-80/128, Int. J. Comput. Math. 90 (2013), pp. 2553–2563.
- Y. Liu, Y.S. Lee, H.-K. Zhang, T.-Y. Wu, and C.-H. Lo, Modelling and simulations for DDoS attacks mitigation in identifier–locator split network, Int. J. Comput. Math. 90 (12) (2013), pp. 2541–2552.
- Y. Lu and J. Li, New forward-secure public-key encryption without random oracles, Int. J. Comput. Math. 90 (12) (2013), pp. 2603–2613.
- J. Song, K. Lee, and H. Lee, Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo, Int. J. Comput. Math. 90 (12) (2013), pp. 2564–2580.
- Y.-Y. Chen, Y.-.J Wang, and J.-K. Jan, The design of speedy seamless safe messaging mechanism in VANET, Int. J. Comput. Math. 90 (2013), pp. 2614–2630.
- H. Yi, S. Kim, G. Ma, and J.H. Yi, Elastic password authentication scheme using the Passcell-based virtual scroll wheel, Int. J. Comput. Math. 90 (12) (2013), pp. 2530–2540.
- W.-C. Yau, R.C.-W. Phan, S.-H. Heng, and B.-M. Goi, Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester, Int. J. Comput. Math. 90 (12) (2013), pp. 2581–2587.