Advances in Cryptographic Security and Privacy

The field of cryptography is rapidly evolving, with a focus on enhancing security and privacy in various applications. Recent developments have centered around improving the resilience of cryptographic protocols to side-channel attacks, ensuring the security of implementations, and designing new cryptographic primitives with strong security properties. Notably, there is a growing interest in integrating formal methods and verification techniques to guarantee the correctness and security of cryptographic implementations. Additionally, the application of cryptographic techniques to emerging areas such as generative AI in healthcare and secure data distribution is becoming increasingly important. Researchers are also exploring new approaches to cryptographic key generation, including the use of fuzzy logic and system-level entropy. Overall, the field is moving towards more robust, efficient, and adaptable cryptographic solutions. Noteworthy papers include: Automated Side-Channel Analysis of Cryptographic Protocol Implementations, which introduces a methodology to analyze cryptographic protocol implementations for their resilience to side-channel attacks. The Jasmin Compiler Preserves Cryptographic Security, which significantly enhances the guarantees of the Jasmin compiler by showing that its front-end preserves cryptographic security. Securing Generative AI in Healthcare: A Zero-Trust Architecture Powered by Confidential Computing on Google Cloud, which proposes a novel security paradigm that synergistically combines Zero-Trust Architecture with Confidential Computing.

Sources

Automated Side-Channel Analysis of Cryptographic Protocol Implementations

The Jasmin Compiler Preserves Cryptographic Security

Securing Generative AI in Healthcare: A Zero-Trust Architecture Powered by Confidential Computing on Google Cloud

eFPE: Design, Implementation, and Evaluation of a Lightweight Format-Preserving Encryption Algorithm for Embedded Systems

On Counts and Densities of Homogeneous Bent Functions: An Evolutionary Approach

The Grain Family of Stream Ciphers: an Abstraction, Strengthening of Components and New Concrete Instantiations

Location-Dependent Cryptosystem

Symmetric Distributions from Shallow Circuits

A Fuzzy Logic-Based Cryptographic Framework For Real-Time Dynamic Key Generation For Enhanced Data Encryption

Secure parameter identification of ARX systems with CKKS cryptosystem

Built with on top of