Robustness, security and privacy in location-based services for future IoT: A survey

L Chen, S Thombre, K Järvinen, ES Lohan… - Ieee …, 2017‏ - ieeexplore.ieee.org
Internet of Things (IoT) connects sensing devices to the Internet for the purpose of
exchanging information. Location information is one of the most crucial pieces of information …

Chaskey: an efficient MAC algorithm for 32-bit microcontrollers

N Mouha, B Mennink, A Van Herrewege… - Selected Areas in …, 2014‏ - Springer
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers

M Düll, B Haase, G Hinterwälder, M Hutter… - Designs, Codes and …, 2015‏ - Springer
This paper presents new speed records for 128-bit secure elliptic-curve Diffie–Hellman key-
exchange software on three different popular microcontroller architectures. We consider a …

Recryptor: A reconfigurable cryptographic cortex-M0 processor with in-memory and near-memory computing for IoT security

Y Zhang, L Xu, Q Dong, J Wang… - IEEE Journal of Solid …, 2018‏ - ieeexplore.ieee.org
Providing security for the Internet of Things (IoT) is increasingly important, but supporting
many different cryptographic algorithms and standards within the physical constraints of IoT …

Efficient software implementation of ring-LWE encryption

R De Clercq, SS Roy, F Vercauteren… - … , Automation & Test …, 2015‏ - ieeexplore.ieee.org
Present-day public-key cryptosystems such as RSA and Elliptic Curve Cryptography (ECC)
will become insecure when quantum computers become a reality. This paper presents the …

Improving the privacy of iot with decentralised identifiers (dids)

Y Kortesniemi, D Lagutin, T Elo… - Journal of Computer …, 2019‏ - Wiley Online Library
When IoT devices operate not only with the owner of the device but also with third parties,
identifying the device using a permanent identifier, eg, a hardware identifier, can present …

A performance study of crypto-hardware in the low-end IoT

P Kietzmann, L Boeckmann, L Lanzieri… - Cryptology ePrint …, 2021‏ - eprint.iacr.org
In this paper, we contribute a comprehensive resource analysis for widely used
cryptographic primitives across different off-the-shelf IoT platforms, and quantify the …

Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities

S Ullah, RZ Radzi, TM Yazdani, A Alshehri… - IEEE Access, 2022‏ - ieeexplore.ieee.org
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

Beyond ECDSA and RSA: Lattice-based digital signatures on constrained devices

T Oder, T Pöppelmann, T Güneysu - Proceedings of the 51st Annual …, 2014‏ - dl.acm.org
All currently deployed asymmetric cryptography is broken with the advent of powerful
quantum computers. We thus have to consider alternative solutions for systems with long …

Fast and efficient group key exchange in controller area networks (CAN)

A Musuroi, B Groza, L Popa… - IEEE Transactions on …, 2021‏ - ieeexplore.ieee.org
The security of vehicle communication buses and electronic control units has received much
attention in the recent years. However, while essential for practical deployments, the …