A survey on physical unclonable function (PUF)-based security solutions for Internet of Things

A Shamsoshoara, A Korenda, F Afghah, S Zeadally - Computer Networks, 2020 - Elsevier
The vast areas of applications for IoTs in future smart cities, smart transportation systems,
and so on represent a thriving surface for several security attacks with economic …

FPGA-based Physical Unclonable Functions: A comprehensive overview of theory and architectures

NN Anandakumar, MS Hashmi, M Tehranipoor - Integration, 2021 - Elsevier
Abstract Physically Unclonable Functions (PUFs) are a promising technology and have
been proposed as central building blocks in many cryptographic protocols and security …

Securing the future internet of things with post‐quantum cryptography

A Kumar, C Ottaviani, SS Gill, R Buyya - Security and Privacy, 2022 - Wiley Online Library
Traditional and lightweight cryptography primitives and protocols are insecure against
quantum attacks. Thus, a real‐time application using traditional or lightweight cryptography …

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

S Cherbal, A Zier, S Hebal, L Louail… - The Journal of …, 2024 - Springer
Abstract The Internet of Things (IoT) is an important virtual network that allows remote users
to access linked multimedia devices. The development of IoT and its ubiquitous application …

Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey

S Kumari, M Singh, R Singh… - Software: Practice and …, 2022 - Wiley Online Library
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …

Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices

S Kumari, M Singh, R Singh, H Tewari - Knowledge-Based Systems, 2022 - Elsevier
Great extent of modernization in intelligent device automation and wireless sensor network
have encouraged the augmentation of IoTs to interconnect millions of actual devices to the …

Blood-inspired random bit generation using microfluidics system

I Yoon, JH Han, BU Park, HJ Jeon - Scientific Reports, 2024 - nature.com
The development of random number generators (RNGs) using speckle patterns is pivotal for
secure encryption key generation, drawing from the recent statistical properties identified in …

Side-channel analysis of the random number generator in STM32 MCUs

K Ngo, E Dubrova - Proceedings of the Great Lakes Symposium on VLSI …, 2022 - dl.acm.org
The hardware random number generator (RNG) integrated in STM32 MCUs is intended to
ensure that the numbers it generates cannot be guessed with a probability higher than a …

[HTML][HTML] Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics

L Navanesan, NA Le-Khac, M Scanlon… - Forensic Science …, 2024 - Elsevier
Investigation on smart devices has become an essential subdomain in digital forensics. The
inherent diversity and complexity of smart devices pose a challenge to the extraction of …

Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks

F Campos, MJ Kannwischer, M Meyer… - 2020 Workshop on …, 2020 - ieeexplore.ieee.org
The isogeny-based scheme CSIDH is a promising candidate for quantum-resistant static-
static key exchanges with very small public keys, but is inherently difficult to implement in …