A hybrid MCDM approach of selecting lightweight cryptographic cipher based on ISO and NIST lightweight cryptography security requirements for internet of health …
L Ning, Y Ali, H Ke, S Nazir, Z Huanli - IEEE Access, 2020 - ieeexplore.ieee.org
The most serious challenges currently faced by healthcare environment is the decision
making related to the installation of the most suitable and appropriate lightweight …
making related to the installation of the most suitable and appropriate lightweight …
An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices
KD Muthavhine, M Sumbwanyambe - IEEE Access, 2023 - ieeexplore.ieee.org
Camellia is an encryption algorithm implemented in many Internet of Things (IoT) devices.
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …
Flexible and high‐throughput structures of Camellia block cipher for security of the Internet of Things
B Rashidi - IET Computers & Digital Techniques, 2021 - Wiley Online Library
The advancements in wireless communication have created exponential growth in the
Internet of Things (IoT) systems. Security and privacy of the IoT systems are critical …
Internet of Things (IoT) systems. Security and privacy of the IoT systems are critical …
Adaptive secure transmission strategy for industrial wireless edge-enabled CPS
For real-time industrial wireless edge-enabled cyber-physical systems, this paper proposes
an adaptive secure transmission mechanism under the large scale path loss to fight against …
an adaptive secure transmission mechanism under the large scale path loss to fight against …
A new quantum cryptanalysis method on block cipher Camellia
Y Li, H Lin, M Liang, Y Sun - IET Information Security, 2021 - Wiley Online Library
Symmetric cryptography is expected to be quantum safe when long‐term security is needed.
Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on …
Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on …
[PDF][PDF] A Comparative Assessment of Cryptography Algorithms for Data Analytics Applications in Smart Metering Systems
JC Olivares-Rojas, E Reyes-Archundia… - researchgate.net
With the proliferation of smart meters in smart electric networks, new applications and
challenges to the energy sector are brought, mainly with respect to cybersecurity and data …
challenges to the energy sector are brought, mainly with respect to cybersecurity and data …