Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …
domains. They collect data from the real environment and transfer it over the networks …
Vulnerabilities and limitations of MQTT protocol used between IoT devices
D Dinculeană, X Cheng - Applied Sciences, 2019 - mdpi.com
With the proliferation of smart devices capable of communicating over a network using
different protocols, each year more and more successful attacks are recorded against these …
different protocols, each year more and more successful attacks are recorded against these …
Midori: A Block Cipher for Low Energy
In the past few years, lightweight cryptography has become a popular research discipline
with a number of ciphers and hash functions proposed. The designers' focus has been …
with a number of ciphers and hash functions proposed. The designers' focus has been …
PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications
This paper presents a block cipher that is optimized with respect to latency when
implemented in hardware. Such ciphers are desirable for many future pervasive applications …
implemented in hardware. Such ciphers are desirable for many future pervasive applications …
[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
[图书][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
[图书][B] The design of Rijndael
Joan Daemen Vincent Rijmen The Advanced Encryption Standard (AES) Second Edition
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
Page 1 Information Security and Cryptography Joan Daemen Vincent Rijmen The Design of …
A review of lightweight block ciphers
Embedded systems are deployed in various domains, including industrial installations,
critical and nomadic environments, private spaces and public infrastructures. Their operation …
critical and nomadic environments, private spaces and public infrastructures. Their operation …
[图书][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
Preventing page faults from telling your secrets
New hardware primitives such as Intel SGX secure a user-level process in presence of an
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …
untrusted or compromised OS. Such" enclaved execution" systems are vulnerable to several …