Designing access control security protocol for Industry 4.0 using Blockchain‐as‐a‐Service

A Vangala, AK Das, N Kumar… - Security and …, 2024 - Wiley Online Library
Industry 4.0 is a revolution of the operations in the industrial manufacturing for increased
productivity, trade and commerce. It is heavily reliant on the automation of the processes and …

Privacy-preserving authenticated key exchange for constrained devices

L Ferreira - International Conference on Applied Cryptography and …, 2022 - Springer
In this paper we investigate the field of privacy-preserving authenticated key exchange
protocols (PPAKE). First we make a cryptographic analysis of a previous PPAKE protocol …

Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol

L Ni, H Zhou, Y Zhang, X Liu, B Gu - Proceedings of the 2023 13th …, 2023 - dl.acm.org
In recent years, the rapid development of Quantum Computing technology has had a huge
impact on the security of traditional Public Key Cryptography. However, the security of Hash …

Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT, or When SAKE Turns Out to Be SAKE

L Ferreira - Cryptology ePrint Archive, 2020 - eprint.iacr.org
In this paper we make an extensive analysis of SAKE $^+ $ and SAKE $^+ $-AM, two key
exchange protocols. We show that several attacks are practicable against these protocols …

[HTML][HTML] IJCNC-02

MTOMA KEY - ijcnc.com
Internet of things (IoT), is the interconnection via the Internet of computing devices
embedded in everyday objects, enabling them to send and receive data. The …

[引用][C] Cryptanalysis of a" Strengthened" Key Exchange Protocol for IoT.

L Ferreira - IACR Cryptol. ePrint Arch., 2020