A Review on the Use of Blockchain for the Internet of Things

TM Fernández-Caramés, P Fraga-Lamas - Ieee Access, 2018 - ieeexplore.ieee.org
The paradigm of Internet of Things (IoT) is paving the way for a world, where many of our
daily objects will be interconnected and will interact with their environment in order to collect …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

Internet of Things: Security vulnerabilities and challenges

I Andrea, C Chrysostomou… - 2015 IEEE symposium …, 2015 - ieeexplore.ieee.org
Internet of Things (IoT) has been given a lot of emphasis since the 90s when it was first
proposed as an idea of interconnecting different electronic devices through a variety of …

The PHOTON Family of Lightweight Hash Functions

J Guo, T Peyrin, A Poschmann - … , Santa Barbara, CA, USA, August 14-18 …, 2011 - Springer
RFID security is currently one of the major challenges cryptography has to face, often solved
by protocols assuming that an on-tag hash function is available. In this article we present the …

SHA-2 acceleration meeting the needs of emerging applications: A comparative survey

R Martino, A Cilardo - IEEE Access, 2020 - ieeexplore.ieee.org
While SHA-2 is a ubiquitous cryptographic hashing primitive, its role in emerging application
domains, eg blockchains or trusted IoT components, has made the acceleration of SHA-2 …

Lightweight secure pufs

M Majzoobi, F Koushanfar… - 2008 IEEE/ACM …, 2008 - ieeexplore.ieee.org
To ensure security and robustness of the next generation of Physically Unclonable
Functions (PUFs), we have developed a new methodology for PUF design. Our approach …

Design and implementation of PUF-based" unclonable" RFID ICs for anti-counterfeiting and security applications

S Devadas, E Suh, S Paral, R Sowell… - … conference on RFID, 2008 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) exploit the physical characteristics of the silicon and
the IC manufacturing process variations to uniquely characterize each and every silicon …

Advanced smart card based password authentication protocol

R Song - Computer Standards & Interfaces, 2010 - Elsevier
Password-based authentication is widely used for systems that control remote access to
computer networks. In order to address some of the security and management problems that …

On privacy models for RFID

S Vaudenay - International conference on the theory and application …, 2007 - Springer
We provide a formal model for identification schemes. Under this model, we give strong
definitions for security and privacy. Our model captures the notion of a powerful adversary …

Grøstl-a SHA-3 candidate

P Gauravaram, LR Knudsen, K Matusiewicz, F Mendel… - 2009 - drops.dagstuhl.de
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression
function built from two fixed, large, distinct permutations. The design of Grøstl is transparent …