Zero trust architecture (zta): A comprehensive survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
A survey on network security for cyber–physical systems: From threats to resilient design
Cyber-physical systems (CPS) are considered the integration of physical systems in the real
world and control software in computing systems. In CPS, the real world and the computing …
world and control software in computing systems. In CPS, the real world and the computing …
Lightweight cryptography system for IoT devices using DNA
MAF Al-Husainy, B Al-Shargabi… - Computers and Electrical …, 2021 - Elsevier
Many lightweight encryption algorithms have been developed for tackling the limitations of
resources on the Internet of Things (IoT) devices. Such devices have limited processing …
resources on the Internet of Things (IoT) devices. Such devices have limited processing …
A survey on nist selected third round candidates for post quantum cryptography
The tremendous increase in the volume of data over internet for many applications such as
banking, hospitals, insurance, online trading, messengers, voice communications and …
banking, hospitals, insurance, online trading, messengers, voice communications and …
RISC-V instruction set extensions for lightweight symmetric cryptography
Abstract The NIST LightWeight Cryptography (LWC) selection process aims to standardise
cryptographic functionality which is suitable for resource-constrained devices. Since the …
cryptographic functionality which is suitable for resource-constrained devices. Since the …
Discussion on a new paradigm of endogenous security towards 6G networks
X Ji, J Wu, L Jin, K Huang, Y Chen, X Sun… - Frontiers of Information …, 2022 - Springer
The sixth-generation mobile communication (6G) networks will face more complex
endogenous security problems, and it is urgent to propose new universal security theories …
endogenous security problems, and it is urgent to propose new universal security theories …
Hardware constructions for error detection in lightweight authenticated cipher ASCON benchmarked on FPGA
J Kaur, MM Kermani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Lightweight cryptography plays a vital role in securing resource-constrained embedded
systems such as deeply-embedded systems, RFID tags, sensor networks, and the Internet of …
systems such as deeply-embedded systems, RFID tags, sensor networks, and the Internet of …
Analysis of ascon, drygascon, and shamash permutations
C Tezcan - International Journal of Information Security Science, 2020 - dergipark.org.tr
Ascon, DryGASCON, and Shamash are submissions to NIST's lightweight cryptography
standardization process and have similar designs. We analyze these algorithms against …
standardization process and have similar designs. We analyze these algorithms against …
Security threats and cryptographic protocols for medical wearables
L Hernández-Álvarez, JJ Bullón Pérez, FK Batista… - Mathematics, 2022 - mdpi.com
In the past few years, the use of several medical devices is increasing. This paper will pay
attention to a device developed to get measures of the temperature of diabetic foot. These …
attention to a device developed to get measures of the temperature of diabetic foot. These …
An enhanced lightweight speck system for cloud-based smart healthcare
In the realm of information and communication sciences, the Internet of Things (IoT) is a new
technology with sensors in the healthcare sector. Sensors are critical IoT devices that …
technology with sensors in the healthcare sector. Sensors are critical IoT devices that …