Post-quantum lattice-based cryptography implementations: A survey
The advent of quantum computing threatens to break many classical cryptographic
schemes, leading to innovations in public key cryptography that focus on post-quantum …
schemes, leading to innovations in public key cryptography that focus on post-quantum …
The effect of IoT new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
Internet of Things (IoT) is an increasingly popular technology that enables physical devices,
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …
vehicles, home appliances, etc., to communicate and even inter operate with one another. It …
From pre-quantum to post-quantum IoT security: A survey on quantum-resistant cryptosystems for the Internet of Things
TM Fernández-Caramés - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Although quantum computing is still in its nascent age, its evolution threatens the most
popular public-key encryption systems. Such systems are essential for today's Internet …
popular public-key encryption systems. Such systems are essential for today's Internet …
Practical CCA2-secure and masked ring-LWE implementation
During the last years public-key encryption schemes based on the hardness of ring-LWE
have gained significant popularity. For real-world security applications assuming strong …
have gained significant popularity. For real-world security applications assuming strong …
Lattice-based key-sharing schemes: A survey
Public-key cryptography is an indispensable component used in almost all of our present-
day digital infrastructure. However, most if not all of it is predominantly built upon hardness …
day digital infrastructure. However, most if not all of it is predominantly built upon hardness …
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
The concept of the Internet of Things (IoT) arises due to the change in the characteristics and
numbers of smart devices. Communication of things makes it important to ensure security in …
numbers of smart devices. Communication of things makes it important to ensure security in …
[HTML][HTML] A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
Abstract The Internet of Things (IoT) has taken the interconnected world by storm. Due to
their immense applicability, IoT devices are being scaled at exponential proportions …
their immense applicability, IoT devices are being scaled at exponential proportions …
An IoT honeynet based on multiport honeypots for capturing IoT attacks
Internet of Things (IoT) devices are vulnerable against attacks because of their limited
network resources and complex operating systems. Thus, a honeypot is a good method of …
network resources and complex operating systems. Thus, a honeypot is a good method of …
Post-quantum cryptoprocessors optimized for edge and resource-constrained devices in IoT
By exponential increase in applications of the Internet of Things (IoT), such as smart
ecosystems or e-health, more security threats have been introduced. In order to resist known …
ecosystems or e-health, more security threats have been introduced. In order to resist known …
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
Abstract The Internet of Things (IoT) introduces an active connection between smart devices
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …
for revolutionizing our modern lives in this world. But, IoT devices often exhibit several …