Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …
A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …
one of the most interesting technologies of the last decade. It is a new paradigm able to …
Comparative analysis of cryptographic algorithms
Z Hercigonja - International Journal of Digital Technology & Economy, 2016 - hrcak.srce.hr
Sažetak Cyber security ensures a secure information exchange and enables communication
through the Internet. The data needs to be protected from unauthorized access and …
through the Internet. The data needs to be protected from unauthorized access and …
Secure data encryption through a combination of AES, RSA and HMAC
ESI Harba - Engineering, Technology & Applied Science Research, 2017 - etasr.com
Secure file transfer based upon well-designed file encryption and authorization systems
expend considerable effort to protect passwords and other credentials from being stolen …
expend considerable effort to protect passwords and other credentials from being stolen …
Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices
Nowadays, terabytes of digital data are generated and sent online every second. However,
securing this extent of information has always been a challenging task. Cryptography is a …
securing this extent of information has always been a challenging task. Cryptography is a …
A comprehensive survey of post-quantum cryptography and its implications
Cryptography has been in existence since before the advent of computers. It encompasses a
variety of techniques designed to secure information, whether it is at rest or in transit …
variety of techniques designed to secure information, whether it is at rest or in transit …
Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network
In this paper, we have proposed a lightweight mutual authentication and key agreement
scheme for 5G (5GMAKA) using the symmetric-key cryptographic framework. The proposed …
scheme for 5G (5GMAKA) using the symmetric-key cryptographic framework. The proposed …
[PDF][PDF] General summary of cryptography
A Zaru, M Khan - Journal of Engineering Research and Application, 2018 - academia.edu
Cryptographic mechanisms are an important security component of an operating system in
securing the system itself and its communication paths. Indeed in many situations …
securing the system itself and its communication paths. Indeed in many situations …
[PDF][PDF] Image Encryption using a Binary Search Tree Structure-Based Key
MAF Al-Husainy, HAA Al-Sewadi… - Int. J. Com. Dig. Sys, 2022 - academia.edu
Due to the ever-increasing cybercrime and hazards on digital information stored or in transit
over computer clouds and networks, so many encryption algorithms were developed and …
over computer clouds and networks, so many encryption algorithms were developed and …
Trustless contract management: a study on the benefits of blockchain-based smart contracts
A Gucciardi - 2023 - webthesis.biblio.polito.it
Blockchain technology and smart contracts are changing and challenging the framework in
which business is conducted. Contracts are an essential part of business and legal …
which business is conducted. Contracts are an essential part of business and legal …