Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK

S Nobuyuki - IET Information Security, 2023 - Wiley Online Library
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the
lightweight block cipher for Internet of things devices in an edge computing environment …

Intelligent task off-loading and resource allocation for IOE devices in smart environment

SU Jamil - 2023 - researchoutput.csu.edu.au
Abstract The Internet of Everything (IoE) enables the smart environment to monitor multiple
geographically distributed IoE nodes. There has been an enormous increase in information …

Performance Evaluation of Lightweight ASCON-HASH Algorithm for IoT Devices

RP Neve, R Bansode - International Conference on Intelligent Computing …, 2023 - Springer
Lightweight cryptographic hashing algorithms are designed to be efficient and fast, making
them suitable for use in resource-constrained milieus such as Internet of Things (IoT) …

A Lightweight Cryptographic Algorithm for IoT Devices based on Hybrid Architecture

NI Toma, MA Kashem, S Rana - 2024 3rd International …, 2024 - ieeexplore.ieee.org
This paper introduces a new lightweight cryptographic algorithm with a hybrid architecture
that is specifically designed for securing Internet of Things (IoT) devices. The hybrid …

Lightweight Cryptographic Solutions for Resource-constrained Devices in Cyber-Physical Systems

GK Pranav, Z Mishra, B Acharya - Intelligent Security Solutions for …, 2024 - taylorfrancis.com
The growth of the internet has led to the integration of cyber-physical systems (CPS) into
various sectors such as home automation, healthcare, automotive, industry, and …

An innovative design of substitution-box using Trigonometric-Multiplicative Functions Using Square Root Arguments: A Data-driven study.

SAR Shirazi, SA Shah, A Wahab… - The Asian Bulletin of Big …, 2024 - abbdm.com
In the evolving landscape of digital technology, the imperative for robust data security
mechanisms has escalated, given the increasing sophistication of cyber threats. This …

Digital signature algorithm based on ElGamal, Diffie-Hellman protocol and the number π

R Flores-Carapia, VM Silva-García… - 2023 - preprints.org
This research proposes an algorithm to sign messages using the ElGamal asymmetric
cryptosystem, called: Digital signature algorithm based on ElGamal, Diffie-Hellman protocol …

Principales técnicas criptográficas aplicadas a la seguridad de la información en IoT: una revisión sistemática

POG Dionicio, AJL Gil… - Ingenio …, 2023 - portal.amelica.org
Este artículo de revisión proporciona una visión exhaustiva de las principales técnicas
criptográficas aplicadas a la seguridad de la información en el Internet de las Cosas (IoT) …