Using New Technologies in Cyber Security Solutions (2nd Edition)

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "ICT Infrastructures for Cybersecurity".

Deadline for manuscript submissions: 31 March 2025 | Viewed by 949

Special Issue Editors


E-Mail Website
Guest Editor
School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK
Interests: critical infrastructure protection; authentication methods; IDS
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Centre for Securing Digital Futures, Edith Cowan University, Perth, WA 6027, Australia
Interests: cyber security; security of industrial control systems/SCADA; digital forensics; cyber physical systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

In this Special Issue of Computers, original research articles and reviews are welcome. The main topic of research is cyber security. Novel technologies and methods that can be used in cyber security fields are acceptable. Example research areas may include (but are not limited to) the following:

  • Using blockchain technologies on cyber security solutions;
  • Using LLMs, deep learning and active learning on cyber security solutions;
  • IoT, virtualization and cloud computing security;
  • Security and privacy issues in metaverse;
  • Using pot-quantum cryptographic solutions;
  • Secure smart contracts;
  • Cyber-attacks on blockchain technology;
  • Novel cyber-crimes on social media using deepfake technology.

Recently, most daily life activities have moved into the digital world. These days, it is easier to get benefits from online transactions because many people can be easily manipulated by cyber attackers. According to recent scientific reports, in 2025, cybercrimes will cost the world economy about USD 10 trillion, and cybercrime will be one of the most profitable sectors worldwide. It can be clearly understood that the number of cyber-related crimes are increasing in high volumes, and there is no feasible technique or method which can effectively stop the attackers. When cyber defenders find new solutions to the known attacks, cybercriminals find new attacks which have not been seen before. In other words, most of the time, the cybercriminals are one step ahead. Using new technologies, such as blockchain, smart contracts, virtualization, LLMs, deep learning, active learning, and post-quantum crypto, can be one of the most promising solutions in the cyber security area. Thus, in this Special Issue, we expect original research articles as well as review papers that may apply various new technologies and methods in the cyber security field. This Special Issue will present new ideas on cyber security, expand scholars domain knowledge, and provide possible efficient solutions against cybercriminals.

Prof. Dr. Leandros Maglaras
Prof. Dr. Helge Janicke
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • LLM cybersecurity solutions
  • post-quantum crypto
  • deepfake attacks
  • metaverse cybersecurity

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

30 pages, 566 KiB  
Article
Area–Time-Efficient High-Radix Modular Inversion Algorithm and Hardware Implementation for ECC over Prime Fields
by Yamin Li
Computers 2024, 13(10), 265; https://doi.org/10.3390/computers13100265 - 12 Oct 2024
Viewed by 706
Abstract
Elliptic curve cryptography (ECC) is widely used for secure communications, because it can provide the same level of security as RSA with a much smaller key size. In constrained environments, it is important to consider efficiency, in terms of execution time and hardware [...] Read more.
Elliptic curve cryptography (ECC) is widely used for secure communications, because it can provide the same level of security as RSA with a much smaller key size. In constrained environments, it is important to consider efficiency, in terms of execution time and hardware costs. Modular inversion is a key time-consuming calculation used in ECC. Its hardware implementation requires extensive hardware resources, such as lookup tables and registers. We investigate the state-of-the-art modular inversion algorithms, and evaluate the performance and cost of the algorithms and their hardware implementations. We then propose a high-radix modular inversion algorithm aimed at reducing the execution time and hardware costs. We present a detailed radix-8 hardware implementation based on 256-bit primes in Verilog HDL and compare its cost performance to other implementations. Our implementation on the Altera Cyclone V FPGA chip used 1227 ALMs (adaptive logic modules) and 1037 registers. The modular inversion calculation took 3.67 ms. The AT (area–time) factor was 8.30, outperforming the other implementations. We also present an implementation of ECC using the proposed radix-8 modular inversion algorithm. The implementation results also showed that our modular inversion algorithm was more efficient in area–time than the other algorithms. Full article
(This article belongs to the Special Issue Using New Technologies in Cyber Security Solutions (2nd Edition))
Show Figures

Figure 1

Back to TopTop