Security and privacy for the industrial internet of things: An overview of approaches to safeguarding endpoints
Endpoint devices form a core part of the architecture of the Industrial Internet of Things (IIoT).
Aspects of endpoint device security also extend to related technology paradigms, such as …
Aspects of endpoint device security also extend to related technology paradigms, such as …
When federated learning meets blockchain: A new distributed learning paradigm
Motivated by the increasingly powerful computing capabilities of end-user equipment, and
by the growing privacy concerns over sharing sensitive raw data, a distributed machine …
by the growing privacy concerns over sharing sensitive raw data, a distributed machine …
SDN security review: Threat taxonomy, implications, and open challenges
Software-Defined networking (SDN) is a networking paradigm to enable dynamic, flexible,
and programmatically efficient configuration of networks to revolutionize network control and …
and programmatically efficient configuration of networks to revolutionize network control and …
Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …
energy consumption, and bandwidth requirements, making it the most preferred public key …
AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT
B Haase, B Labrique - Cryptology ePrint Archive, 2018 - eprint.iacr.org
Increasingly connectivity becomes integrated in products and devices that previously
operated in a stand-alone setting. This observation holds for many consumer ap-plications …
operated in a stand-alone setting. This observation holds for many consumer ap-plications …
Using hardware features for increased debugging transparency
With the rapid proliferation of malware attacks on the Internet, understanding these
malicious behaviors plays a critical role in crafting effective defense. Advanced malware …
malicious behaviors plays a critical role in crafting effective defense. Advanced malware …
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones
Due to the mobility, flexibility and autonomy of drones, the Internet of Drones (IoD) have
gained momentum recently and are being widely used in a variety of fields, such as …
gained momentum recently and are being widely used in a variety of fields, such as …
IoT-NUMS: evaluating NUMS elliptic curve cryptography for IoT platforms
In 2015, NIST held a workshop calling for new candidates for the next generation of elliptic
curves to replace the almost two-decade old NIST curves. Nothing Upon My Sleeves …
curves to replace the almost two-decade old NIST curves. Nothing Upon My Sleeves …
Supersingular isogeny key encapsulation (SIKE) round 2 on ARM Cortex-M4
We present the first practical software implementation of Supersingular Isogeny Key
Encapsulation (SIKE) round 2, targeting NIST's 1, 2, 3, and 5 security levels on 32-bit ARM …
Encapsulation (SIKE) round 2, targeting NIST's 1, 2, 3, and 5 security levels on 32-bit ARM …
Side-channel analysis and countermeasure design for implementation of Curve448 on cortex-M4
The highly secure Curve448 cryptographic algorithm has been recently recommended by
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …