Lightweight cryptography methods

WJ Buchanan, S Li, R Asif - Journal of Cyber Security Technology, 2017 - Taylor & Francis
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …

Cryptography algorithms for enhancing IoT security

F Thabit, O Can, AO Aljahdali, GH Al-Gaphari… - Internet of Things, 2023 - Elsevier
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …

Simpira v2: A family of efficient permutations using the AES round function

S Gueron, N Mouha - International Conference on the Theory and …, 2016 - Springer
This paper introduces Simpira, a family of cryptographic permutations that supports inputs of
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …

Secure PBFT consensus-based lightweight blockchain for healthcare application

P Hegde, PKR Maddikunta - Applied Sciences, 2023 - mdpi.com
Recent advancement in IoT technology has boosted the healthcare domain with enormous
usage of IoT devices to provide elevated services to patients with chronic disorders on a real …

IoT security: challenges and countermeasures

M Litoussi, N Kannouf, K El Makkaoui, A Ezzati… - Procedia Computer …, 2020 - Elsevier
Internet of things (IoT) dramatically influences our daily lives in several domains, ranging
from teeny wearable devices to large industrial systems. IoT technology aims to enhance …

Identity in the Internet-of-Things (IoT): New challenges and opportunities

KY Lam, CH Chi - International Conference on Information and …, 2016 - Springer
From digitization to datafication, Internet-of-Things (IoT) plays an important role as enabler in
the value creation process from big data. As is expected, security has naturally become one …

Cube attacks on round-reduced TinyJAMBU

WL Teng, I Salam, WC Yau, J Pieprzyk, RCW Phan - Scientific Reports, 2022 - nature.com
Lightweight cryptography has recently gained importance as the number of Internet of things
(IoT) devices connected to Internet grows. Its main goal is to provide cryptographic …

AdvParams: An active DNN intellectual property protection technique via adversarial perturbation based parameter encryption

M Xue, Z Wu, Y Zhang, J Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The construction of Deep Neural Network (DNN) models requires high cost, thus a well-
trained DNN model can be considered as intellectual property (IP) of the model owner. To …

Lightweight cryptography algorithms for internet of things enabled networks: An overview

LM Shamala, G Zayaraz, K Vivekanandan… - Journal of Physics …, 2021 - iopscience.iop.org
Internet of Things is a worldwide set-up of interconnected entities that permits millions of
devices to communicate with each other. Combined with reliable communication, ensuring …

[图书][B] GDPR and Cyber Security for Business Information Systems

A Gobeo, C Fowler, WJ Buchanan - 2022 - taylorfrancis.com
The General Data Protection Regulation is the latest, and one of the most stringent,
regulations regarding Data Protection to be passed into law by the European Union …