Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

AT Mozipo, JM Acken - IET Computers & Digital Techniques, 2023 - Wiley Online Library
The protection of communications between Internet of Things (IoT) devices is of great
concern because the information exchanged contains vital sensitive data. Malicious agents …

[PDF][PDF] New Efficient Cryptographic Techniques For Cloud Computing Security

M Kaleem, MA Mushtaq, U Jamil, SA Ramay… - Migration …, 2024 - researchgate.net
The exponential expansion of Cloud computing has resulted in a solution revolution within
data storage and employ, but it has also increased security concerns. Typically, traditional …

Efficient Braille Transformation for Secure Password Hashing

H Touil, N El Akkad, K Satori, NF Soliman… - IEEE …, 2024 - ieeexplore.ieee.org
In this work, we propose a novel approach to enhancing the security of passwords before
storing them in databases. Our method utilizes Braille transformation to encrypt the …

Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things

S Windarta, S Suryadi, K Ramli, AA Lestari… - IEEE …, 2023 - ieeexplore.ieee.org
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …

H2B: Crypto Hash Functions Based on Hybrid Ring Generators

J Rajski, M Trawka, J Tyszer… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Protection of integrated circuits (ICs) against hardware security threats has been tackled by
many schemes proposed to mitigate risks associated with an unauthorized access and …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

When Perceptual Authentication Hashing Meets Neural Architecture Search

Y Zhou, X Li, Y Fang, C Qin - Proceedings of the 31st ACM International …, 2023 - dl.acm.org
In recent years, many perceptual authentication hashing schemes have been proposed,
especially for image content authentication. However, most of the schemes directly use the …

[HTML][HTML] IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON

M Al-Shatari, FA Hussin, AA Aziz, TAE Eisa, XT Tran… - Applied Sciences, 2023 - mdpi.com
IoT devices and embedded systems are deployed in critical environments, emphasizing
attributes like power efficiency and computational capabilities. However, these constraints …

Embedded light-weight cryptography technique to preserve privacy of healthcare wearable IoT device data

BM KP, N Patwari - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) technology is widely applied in various domains such as agriculture,
health, business, etc. IoT devices mainly deal with collecting sensory data and …

Lightweight machine learning for privacy-preserving and secure networked medical devices: The SEPTON project use cases

S Messinis, N Protonotarios, I Tzortzis, I Rallis… - Proceedings of the 16th …, 2023 - dl.acm.org
Cybersecurity incidents are among the greatest concerns of businesses, government
agencies, and private citizens today. In the modern world, the protection of data and …