Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities
VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …
domains. They collect data from the real environment and transfer it over the networks …
Lightweight cryptography methods
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
Sensors for context-aware smart healthcare: A security perspective
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …
and faster data networks have propelled environments augmented with contextual and real …
Efficient implementation of PRESENT and GIFT on quantum computers
Grover search algorithm is the most representative quantum attack method that threatens the
security of symmetric key cryptography. If the Grover search algorithm is applied to …
security of symmetric key cryptography. If the Grover search algorithm is applied to …
An overview on the challenges and limitations using cloud computing in healthcare corporations
G Agapito, M Cannataro - Big Data and Cognitive Computing, 2023 - mdpi.com
Technological advances in high throughput platforms for biological systems enable the cost-
efficient production of massive amounts of data, leading life science to the Big Data era. The …
efficient production of massive amounts of data, leading life science to the Big Data era. The …
Mode-level vs. implementation-level physical security in symmetric cryptography: a practical guide through the leakage-resistance jungle
Triggered by the increasing deployment of embedded cryptographic devices (eg, for the
IoT), the design of authentication, encryption and authenticated encryption schemes …
IoT), the design of authentication, encryption and authenticated encryption schemes …
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …
large amounts of data to be connected. Therefore, IoT security has fundamental …
Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
Endpoint devices form a core part of the architecture of the Industrial Internet of Things (IIoT).
Aspects of endpoint device security also extend to related technology paradigms, such as …
Aspects of endpoint device security also extend to related technology paradigms, such as …
A novel architectural framework on IoT ecosystem, security aspects and mechanisms: a comprehensive survey
M Bouzidi, N Gupta, FA Cheikh, A Shalaginov… - IEEE …, 2022 - ieeexplore.ieee.org
For the past few years, the Internet of Things (IoT) technology continues to not only gain
popularity and importance, but also witnesses the true realization of everything being smart …
popularity and importance, but also witnesses the true realization of everything being smart …
Improved secure encryption with energy optimization using random permutation pseudo algorithm based on internet of thing in wireless sensor networks
The use of wireless and Internet of Things (IoT) devices is growing rapidly. Because of this
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …
expansion, nowadays, mobile apps are integrated into low-cost, low-power platforms. Low …