A new priority aware routing protocol for efficient emergency data transmissions in MANETs
This paper introduces a new priority-aware routing protocol for mobile Ad-hoc networks to
be utilized in emergencies, which is based on AODV. Mobile Ad-hoc networks find extensive …
be utilized in emergencies, which is based on AODV. Mobile Ad-hoc networks find extensive …
Highly optimized curve448 and ed448 design in wolfssl and side-channel evaluation on cortex-m4
M Anastasova, R El Khatib, A Laclaustra… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
The compact key sizes and the low computational latency of the Elliptic Curve Cryptography
(ECC) family of curves sparked high interest in their integration into network protocols. The …
(ECC) family of curves sparked high interest in their integration into network protocols. The …
PQC Cloudization: Rapid Prototy** of Scalable NTT/INTT Architecture to Accelerate Kyber
M Bisheh-Niasar, D Lo, A Parthasarathy… - 2023 IEEE Physical …, 2023 - ieeexplore.ieee.org
The advent of quantum computers poses a serious challenge to the security of cloud
infrastructures and services, as they can potentially break the existing public-key …
infrastructures and services, as they can potentially break the existing public-key …
Efficient and Side-Channel Resistant Ed25519 on ARM Cortex-M4
D Owens, R El Khatib, M Bisheh-Niasar… - … on Circuits and …, 2024 - ieeexplore.ieee.org
An estimated 14.7 billion Internet of Things (IoT) devices will be connected to the Internet by
2023. The ubiquity of these devices creates exciting new opportunities, while at the same …
2023. The ubiquity of these devices creates exciting new opportunities, while at the same …
An efficient conference key agreement protocol suited for resource constrained devices
M Pundir, A Kumar - Journal of Parallel and Distributed Computing, 2025 - Elsevier
Conference key agreement (CKA) is essential for securing communication in group-oriented
scenarios like multi-party messaging and collaborative environments. While elliptic curve …
scenarios like multi-party messaging and collaborative environments. While elliptic curve …
Fully Hybrid TLSv1. 3 in WolfSSL on Cortex-M4
M Anastasova, R Azarderakhsh… - … Conference on Applied …, 2024 - Springer
To provide safe communication across an unprotected medium such as the internet, network
protocols are being established. These protocols employ public key techniques to perform …
protocols are being established. These protocols employ public key techniques to perform …
Spread Spectrum-Based Countermeasures for Cryptographic RISC-V SoC
Side-channel analysis attacks have become the primary method for exploiting the
vulnerabilities of cryptographic devices. Therefore, focusing on countermeasures to …
vulnerabilities of cryptographic devices. Therefore, focusing on countermeasures to …
Classical and Post-Quantum Cryptography on Modern ARM-Based Processors
M Anastasova - 2024 - search.proquest.com
Cryptographic algorithms are being developed and incorporated into network security
protocols to provide secure communication over vulnerable mediums like the Internet. These …
protocols to provide secure communication over vulnerable mediums like the Internet. These …