Energy-efficient mechanisms in security of the internet of things: A survey

H Hellaoui, M Koudil, A Bouabdallah - Computer Networks, 2017 - Elsevier
Security primitives in the IoT (Internet of Things) are energy consuming. Finding the best
solutions that reduce energy consumption while ensuring the required security services is …

[图书][B] Cryptographic Boolean functions and applications

TW Cusick, P Stanica - 2017 - books.google.com
Cryptographic Boolean Functions and Applications, Second Edition is designed to be a
comprehensive reference for the use of Boolean functions in modern cryptography. While …

Performance evaluation of cryptographic algorithms over IoT platforms and operating systems

GCCF Pereira, RCA Alves, FL Silva… - Security and …, 2017 - Wiley Online Library
The deployment of security services over Wireless Sensor Networks (WSN) and IoT devices
brings significant processing and energy consumption overheads. These overheads are …

Espresso: A stream cipher for 5G wireless communication systems

E Dubrova, M Hell - Cryptography and Communications, 2017 - Springer
The demand for more efficient ciphers is a likely to sharpen with new generation of products
and applications. Previous cipher designs typically focused on optimizing only one of the …

A survey on lightweight ciphers for IoT devices

MA Philip - … on technological advancements in power and …, 2017 - ieeexplore.ieee.org
Embedded systems are found to be used in a wide range of domains. But the inherent
limitations of size, memory and power, limits its functionality in secure transmission of …

Degree evaluation of NFSR-based cryptosystems

M Liu - Annual International Cryptology Conference, 2017 - Springer
In this paper, we study the security of NFSR-based cryptosystems from the algebraic degree
point of view. We first present a general framework of iterative estimation of algebraic degree …

Chaotic cellular neural network‐based true random number generator

B Karakaya, V Çelik, A Gülten - International Journal of Circuit …, 2017 - Wiley Online Library
This paper presents implementation of a chaotic cellular neural network (CNN)‐based true
random number generator on a field programmable gate array (FPGA) board. In this …

Cloak: A stream cipher based encryption protocol for mobile cloud computing

A Banerjee, M Hasan, MA Rahman… - IEEE Access, 2017 - ieeexplore.ieee.org
Mobile device and its applications have revolutionized the way we store and share data. It is
becoming a warehouse of users personal information. Unluckily, most of these data are …

A comprehensive performance analysis of hardware implementations of CAESAR candidates

S Kumar, J Haj-Yahya, M Khairallah… - Cryptology ePrint …, 2017 - eprint.iacr.org
Abstract Authenticated encryption with Associated Data (AEAD) plays a significant role in
cryptography because of its ability to provide integrity, confidentiality and authenticity at the …

Secure and lightweight compressive sensing using stream cipher

V Pudi, A Chattopadhyay… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
We are proposing a lightweight and secure compressive sensing (CS) method for
compression of data generated by image sensors. This method simultaneously compresses …