Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists
AT Mozipo, JM Acken - IET Computers & Digital Techniques, 2023 - Wiley Online Library
The protection of communications between Internet of Things (IoT) devices is of great
concern because the information exchanged contains vital sensitive data. Malicious agents …
concern because the information exchanged contains vital sensitive data. Malicious agents …
[PDF][PDF] New Efficient Cryptographic Techniques For Cloud Computing Security
The exponential expansion of Cloud computing has resulted in a solution revolution within
data storage and employ, but it has also increased security concerns. Typically, traditional …
data storage and employ, but it has also increased security concerns. Typically, traditional …
Efficient Braille Transformation for Secure Password Hashing
In this work, we propose a novel approach to enhancing the security of passwords before
storing them in databases. Our method utilizes Braille transformation to encrypt the …
storing them in databases. Our method utilizes Braille transformation to encrypt the …
Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …
H2B: Crypto Hash Functions Based on Hybrid Ring Generators
Protection of integrated circuits (ICs) against hardware security threats has been tackled by
many schemes proposed to mitigate risks associated with an unauthorized access and …
many schemes proposed to mitigate risks associated with an unauthorized access and …
Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication
JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …
especially in client authentication. The current authentication methods require significant …
When Perceptual Authentication Hashing Meets Neural Architecture Search
Y Zhou, X Li, Y Fang, C Qin - Proceedings of the 31st ACM International …, 2023 - dl.acm.org
In recent years, many perceptual authentication hashing schemes have been proposed,
especially for image content authentication. However, most of the schemes directly use the …
especially for image content authentication. However, most of the schemes directly use the …
[HTML][HTML] IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON
IoT devices and embedded systems are deployed in critical environments, emphasizing
attributes like power efficiency and computational capabilities. However, these constraints …
attributes like power efficiency and computational capabilities. However, these constraints …
Embedded light-weight cryptography technique to preserve privacy of healthcare wearable IoT device data
Internet of Things (IoT) technology is widely applied in various domains such as agriculture,
health, business, etc. IoT devices mainly deal with collecting sensory data and …
health, business, etc. IoT devices mainly deal with collecting sensory data and …
Lightweight machine learning for privacy-preserving and secure networked medical devices: The SEPTON project use cases
Cybersecurity incidents are among the greatest concerns of businesses, government
agencies, and private citizens today. In the modern world, the protection of data and …
agencies, and private citizens today. In the modern world, the protection of data and …