Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey

S Kumari, M Singh, R Singh… - Software: Practice and …, 2022 - Wiley Online Library
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …

A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS

C Lepore, M Ceria, A Visconti, UP Rao, KA Shah… - Mathematics, 2020 - mdpi.com
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …

Comparative analysis of cryptographic algorithms

Z Hercigonja - International Journal of Digital Technology & Economy, 2016 - hrcak.srce.hr
Sažetak Cyber security ensures a secure information exchange and enables communication
through the Internet. The data needs to be protected from unauthorized access and …

Secure data encryption through a combination of AES, RSA and HMAC

ESI Harba - Engineering, Technology & Applied Science Research, 2017 - etasr.com
Secure file transfer based upon well-designed file encryption and authorization systems
expend considerable effort to protect passwords and other credentials from being stolen …

Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices

U Iftikhar, K Asrar, M Waqas, SA Ali - Engineering, Technology & Applied …, 2021 - etasr.com
Nowadays, terabytes of digital data are generated and sent online every second. However,
securing this extent of information has always been a challenging task. Cryptography is a …

A comprehensive survey of post-quantum cryptography and its implications

BS Rawal, A Biswas - Engineering Science & Technology, 2024 - ojs.wiserpub.com
Cryptography has been in existence since before the advent of computers. It encompasses a
variety of techniques designed to secure information, whether it is at rest or in transit …

Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network

SK Palit, M Chakraborty, S Chakraborty - The Journal of Supercomputing, 2023 - Springer
In this paper, we have proposed a lightweight mutual authentication and key agreement
scheme for 5G (5GMAKA) using the symmetric-key cryptographic framework. The proposed …

[PDF][PDF] General summary of cryptography

A Zaru, M Khan - Journal of Engineering Research and Application, 2018 - academia.edu
Cryptographic mechanisms are an important security component of an operating system in
securing the system itself and its communication paths. Indeed in many situations …

[PDF][PDF] Image Encryption using a Binary Search Tree Structure-Based Key

MAF Al-Husainy, HAA Al-Sewadi… - Int. J. Com. Dig. Sys, 2022 - academia.edu
Due to the ever-increasing cybercrime and hazards on digital information stored or in transit
over computer clouds and networks, so many encryption algorithms were developed and …

Trustless contract management: a study on the benefits of blockchain-based smart contracts

A Gucciardi - 2023 - webthesis.biblio.polito.it
Blockchain technology and smart contracts are changing and challenging the framework in
which business is conducted. Contracts are an essential part of business and legal …