A survey on physical unclonable function (PUF)-based security solutions for Internet of Things
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …
and so on represent a thriving surface for several security attacks with economic …
FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …
been proposed as central building blocks in many cryptographic protocols and security …
Securing the future internet of things with post‐quantum cryptography
Traditional and lightweight cryptography primitives and protocols are insecure against
quantum attacks. Thus, a real‐time application using traditional or lightweight cryptography …
quantum attacks. Thus, a real‐time application using traditional or lightweight cryptography …
Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …
to access linked multimedia devices. The development of IoT and its ubiquitous application …
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices
Great extent of modernization in intelligent device automation and wireless sensor network
have encouraged the augmentation of IoTs to interconnect millions of actual devices to the …
have encouraged the augmentation of IoTs to interconnect millions of actual devices to the …
Blood-inspired random bit generation using microfluidics system
I Yoon, JH Han, BU Park, HJ Jeon - Scientific Reports, 2024 - nature.com
The development of random number generators (RNGs) using speckle patterns is pivotal for
secure encryption key generation, drawing from the recent statistical properties identified in …
secure encryption key generation, drawing from the recent statistical properties identified in …
Side-channel analysis of the random number generator in STM32 MCUs
The hardware random number generator (RNG) integrated in STM32 MCUs is intended to
ensure that the numbers it generates cannot be guessed with a probability higher than a …
ensure that the numbers it generates cannot be guessed with a probability higher than a …
[HTML][HTML] Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics
L Navanesan, NA Le-Khac, M Scanlon… - Forensic Science …, 2024 - Elsevier
Investigation on smart devices has become an essential subdomain in digital forensics. The
inherent diversity and complexity of smart devices pose a challenge to the extraction of …
inherent diversity and complexity of smart devices pose a challenge to the extraction of …
Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks
The isogeny-based scheme CSIDH is a promising candidate for quantum-resistant static-
static key exchanges with very small public keys, but is inherently difficult to implement in …
static key exchanges with very small public keys, but is inherently difficult to implement in …