Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

Lightweight cryptography algorithms for resource-constrained IoT devices: A review, comparison and research opportunities

VA Thakor, MA Razzaque, MRA Khandaker - IEEE Access, 2021 - ieeexplore.ieee.org
IoT is becoming more common and popular due to its wide range of applications in various
domains. They collect data from the real environment and transfer it over the networks …

IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices

F Meneghello, M Calore, D Zucchetto… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains,
including personal health care, environmental monitoring, home automation, smart mobility …

Lightweight cryptography: a solution to secure IoT

SS Dhanda, B Singh, P **dal - Wireless Personal Communications, 2020 - Springer
Abstract In Internet of Things (IoT), the massive connectivity of devices and enormous data
on the air have made information susceptible to different type of attacks. Cryptographic …

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

C Beierle, J Jean, S Kölbl, G Leander, A Moradi… - Advances in Cryptology …, 2016 - Springer
We present a new tweakable block cipher family SKINNY, whose goal is to compete with
NSA recent design SIMON in terms of hardware/software performances, while proving in …

{ScatterCache}: thwarting cache attacks via cache set randomization

M Werner, T Unterluggauer, L Giner… - 28th USENIX Security …, 2019 - usenix.org
Cache side-channel attacks can be leveraged as a building block in attacks leaking secrets
even in the absence of software bugs. Currently, there are no practical and generic …

Midori: A Block Cipher for Low Energy

S Banik, A Bogdanov, T Isobe, K Shibutani… - Advances in Cryptology …, 2015 - Springer
In the past few years, lightweight cryptography has become a popular research discipline
with a number of ciphers and hash functions proposed. The designers' focus has been …

Post-quantum zero-knowledge and signatures from symmetric-key primitives

M Chase, D Derler, S Goldfeder, C Orlandi… - Proceedings of the …, 2017 - dl.acm.org
We propose a new class of post-quantum digital signature schemes that:(a) derive their
security entirely from the security of symmetric-key primitives, believed to be quantum …

A survey on wireless body area networks: Architecture, security challenges and research opportunities

MS Hajar, MO Al-Kadri, HK Kalutarage - Computers & Security, 2021 - Elsevier
In the era of communication technologies, wireless healthcare networks enable innovative
applications to enhance the quality of patients' lives, provide useful monitoring tools for …

Ciphers for MPC and FHE

MR Albrecht, C Rechberger, T Schneider… - Advances in Cryptology …, 2015 - Springer
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …