Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly- secure cryptosystem guarantees that the malicious third party cannot guess anything …
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly secure cryptosystem guarantees that the malicious third party cannot guess anything …
B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first introduce entropy and some basic concepts related to information theory. We show how entropy has find its way from thermodynamics into information theory …
B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter completes our discussions in this book via presenting the hybrid combinatorial- Boolean approach for perfectly secure cryptography in IoT. To this end, we first propose a …
B Kaur, M Rakhra, D Singh… - 2024 11th International …, 2024 - ieeexplore.ieee.org
This paper addresses security challenges in Internet of Things (IoT) networks and wireless sensor networks (WSNs) through lightweight cryptographic techniques. We evaluate hash …
ICITS 2012 was the 6th International Conference of Information-theoretic Security, held at the Université de Montréal in Montreal, Quebec, Canada, during August 15–17, 2012. ICITS …
S Kumar, D Kumar - Green Engineering and Technology, 2021 - taylorfrancis.com
As the Internet of Things (IoT) is growing exponentially, the number of data shared between IoT devices is increasing at an exponential rate. Almost all IoT devices are battery …
IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to powerful accelerators supporting numerous of operations including protected key storage …
The Internet of Things (IoT) is intelligent devices connected to a network, which enables collection, transmission, and processing of real-world data. IoT applications make extensive …