Information-Theoretic Cryptography: A Maneuver in the Trade-Off Space of Cryptography in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter discusses the reason why we have chosen to study perfectly secure
cryptography (as a branch of information-theoretic cryptography) among the existing …

[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Information-theoretic cryptography and perfect secrecy

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information
theory. We show how entropy has find its way from thermodynamics into information theory …

A Hybrid Combinatorial-Boolean Approach Toward Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter completes our discussions in this book via presenting the hybrid combinatorial-
Boolean approach for perfectly secure cryptography in IoT. To this end, we first propose a …

Advancements in Lightweight Cryptography: Secure Solutions for Resource-Constrained Environments in IoT, WSNs, and CPS

B Kaur, M Rakhra, D Singh… - 2024 11th International …, 2024 - ieeexplore.ieee.org
This paper addresses security challenges in Internet of Things (IoT) networks and wireless
sensor networks (WSNs) through lightweight cryptographic techniques. We evaluate hash …

[图书][B] Information Theoretic Security

A Smith - 2012 - Springer
ICITS 2012 was the 6th International Conference of Information-theoretic Security, held at
the Université de Montréal in Montreal, Quebec, Canada, during August 15–17, 2012. ICITS …

A survey of lightweight cryptography for power-constrained IoT devices: security challenges and issues

S Kumar, D Kumar - Green Engineering and Technology, 2021 - taylorfrancis.com
As the Internet of Things (IoT) is growing exponentially, the number of data shared between
IoT devices is increasing at an exponential rate. Almost all IoT devices are battery …

Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API

L Boeckmann, P Kietzmann, L Lanzieri… - arXiv preprint arXiv …, 2022 - arxiv.org
IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to
powerful accelerators supporting numerous of operations including protected key storage …

Cryptography for privacy in a resource-constrained IoT: A systematic literature review

F Mendoza-Cardenas, AJ Aparcana-Tasayco… - IEIE Transactions on …, 2022 - dbpia.co.kr
The Internet of Things (IoT) is intelligent devices connected to a network, which enables
collection, transmission, and processing of real-world data. IoT applications make extensive …