Lightweight cryptography system for IoT devices using DNA

MAF Al-Husainy, B Al-Shargabi… - Computers and Electrical …, 2021 - Elsevier
Many lightweight encryption algorithms have been developed for tackling the limitations of
resources on the Internet of Things (IoT) devices. Such devices have limited processing …

[PDF][PDF] A scoping study on lightweight cryptography reviews in IoT

IR Chiadighikaobi, N Katuk - Baghdad Science Journal, 2021 - iasj.net
The efforts in designing and developing lightweight cryptography (LWC) started a decade
ago. Many scholarly studies in literature report the enhancement of conventional …

An energy efficient encryption technique for the Internet of Things sensor nodes

I Sultan, MT Banday - International Journal of Information Technology, 2024 - Springer
Securing data at the back end in Internet of Things (IoT) applications, such as a cloud server,
is easy due to the ample computational resources at that stage. However, securing the data …

Distributed key generation for secure communications between different actors in service oriented highly dense VANET

DN Gupta, R Kumar - Cloud and IoT‐Based Vehicular Ad Hoc …, 2021 - Wiley Online Library
Summary Vehicular Area Network (VANET) consists of very dense network traffic. In a
VANET, many vehicles are communicating with each other or to road side units for different …

Assessment of Lightweight Cryptography Algorithms on ARM Cortex-M Processors

N Moura, J Lucena, E Pereira… - 2023 36th SBC …, 2023 - ieeexplore.ieee.org
The proliferation of sensitive information and data processing in the Internet of Things edge
and end devices is accelerating at a rapid pace. As a result, ensuring security becomes …

Resource usage evaluation of the PHOTON hash function

T Mangole, ASJ Helberg, KK Nair - 2022 Conference on …, 2022 - ieeexplore.ieee.org
Advances in ubiquitous computing have led to the use of the Internet of Things (IoT), which
consists of resource-constrained devices. The use of constrained devices raises significant …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Information-Theoretic Cryptography: A Maneuver in the Trade-Off Space of Cryptography in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter discusses the reason why we have chosen to study perfectly secure
cryptography (as a branch of information-theoretic cryptography) among the existing …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Uma Avaliação Comparativa de Algoritmos de Criptografia Simétrica para Dispositivos Restritos em Recursos

M Ramalho, GS de Oliveira, N Neves… - … em Desempenho de …, 2024 - sol.sbc.org.br
A segurança de dados na Internet das Coisas é fundamental para proteger tanto os
dispositivos quanto os dados que trafegam na rede. No entanto, a segurança é …