Security and Cryptography

R Gupta, P Gupta, J Singh - Software Engineering for Embedded Systems, 2019 - Elsevier
Networking, access, and industrial embedded systems are multibillion-dollar industries.
However, the economic impact of these embedded systems becoming unavailable (or …

Authenticated encryption for time-sensitive critical infrastructure

D Hunter, J Parry, K Radke, C Fidge - Proceedings of the Australasian …, 2017 - dl.acm.org
Encryption is the primary tool for protecting information security, but cyber-physical systems
that interact directly with critical infrastructure, in applications such as power, water and …

Interoperability in end-to-end encrypted messaging

J Len, E Ghosh, P Grubbs, P Rösler - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Abstract The Digital Markets Act (DMA) is a nascent European Union regulation adopted in
May 2022. One of its most controversial provisions is a requirement that so-called …

A context-aware encryption protocol suite for edge computing-based IoT devices

Z Dar, A Ahmad, FA Khan, F Zeshan, R Iqbal… - The Journal of …, 2020 - Springer
Heterogeneous devices are connected with each other through wireless links within a cyber
physical system. These devices undergo resource constraints such as battery, bandwidth …

Enhancing the AvrX kernel with efficient secure communication using software thread integration

P Ganesan, AG Dean - … . RTAS 2004. 10th IEEE Real-Time and …, 2004 - ieeexplore.ieee.org
We present methods to add efficient cryptographic support to low-performance embedded
processors with embedded networks (eg sensor networks). Software thread integration (STI) …

Designing And Implementing a Chat System with Enhanced Security Via AES Encryption Methods

H Liu - Highlights in Science, Engineering and Technology, 2024 - drpress.org
As technology has advanced, we have ushered in the age of the Internet, where online
communication tools have become the preferred method for information exchange. While …

Compact design of the advanced encryption standard algorithm for IEEE 802.15. 4 devices

OY Song, JH Kim - Journal of Electrical Engineering and …, 2011 - koreascience.kr
For low-power sensor networks, a compact design of advanced encryption standard (AES)
algorithm is needed. A very small AES core for ZigBee devices that accelerates computation …

[PDF][PDF] Secure embedded systems

M Vai, DJ Whelihan, BR Nahill, DM Utin… - Lincoln Laboratory …, 2016 - ll.mit.edu
Department of Defense (DoD) systems, eg, computer networks, are increasingly the targets
of deliberate, sophisticated cyber attacks. To assure successful missions, military systems …

Low-cost advanced encryption standard (AES) VLSI architecture: a minimalist bit-serial approach

OJ Hernandez, T Sodon, M Adel - … . IEEE SoutheastCon, 2005., 2005 - ieeexplore.ieee.org
This paper presents a novel minimum cost architecture for the advanced encryption
standard (AES) algorithm. This architecture uses a bit-serial approach, and it is suitable for …

Improving memory encryption performance in secure processors

J Yang, L Gao, Y Zhang - ieee Transactions on Computers, 2005 - ieeexplore.ieee.org
Due to the widespread software piracy and virus attacks, significant efforts have been made
to improve security for computer systems. For stand-alone computers, a key observation is …