Robustness, security and privacy in location-based services for future IoT: A survey
Internet of Things (IoT) connects sensing devices to the Internet for the purpose of
exchanging information. Location information is one of the most crucial pieces of information …
exchanging information. Location information is one of the most crucial pieces of information …
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers
We propose Chaskey: a very efficient Message Authentication Code (MAC) algorithm for 32-
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
bit microcontrollers. It is intended for applications that require 128-bit security, yet cannot …
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
This paper presents new speed records for 128-bit secure elliptic-curve Diffie–Hellman key-
exchange software on three different popular microcontroller architectures. We consider a …
exchange software on three different popular microcontroller architectures. We consider a …
Recryptor: A reconfigurable cryptographic cortex-M0 processor with in-memory and near-memory computing for IoT security
Providing security for the Internet of Things (IoT) is increasingly important, but supporting
many different cryptographic algorithms and standards within the physical constraints of IoT …
many different cryptographic algorithms and standards within the physical constraints of IoT …
Efficient software implementation of ring-LWE encryption
Present-day public-key cryptosystems such as RSA and Elliptic Curve Cryptography (ECC)
will become insecure when quantum computers become a reality. This paper presents the …
will become insecure when quantum computers become a reality. This paper presents the …
Improving the privacy of iot with decentralised identifiers (dids)
When IoT devices operate not only with the owner of the device but also with third parties,
identifying the device using a permanent identifier, eg, a hardware identifier, can present …
identifying the device using a permanent identifier, eg, a hardware identifier, can present …
A performance study of crypto-hardware in the low-end IoT
In this paper, we contribute a comprehensive resource analysis for widely used
cryptographic primitives across different off-the-shelf IoT platforms, and quantify the …
cryptographic primitives across different off-the-shelf IoT platforms, and quantify the …
Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …
internet of things and industry 4.0. These autonomous resource-constrained devices share …
Beyond ECDSA and RSA: Lattice-based digital signatures on constrained devices
All currently deployed asymmetric cryptography is broken with the advent of powerful
quantum computers. We thus have to consider alternative solutions for systems with long …
quantum computers. We thus have to consider alternative solutions for systems with long …
Fast and efficient group key exchange in controller area networks (CAN)
The security of vehicle communication buses and electronic control units has received much
attention in the recent years. However, while essential for practical deployments, the …
attention in the recent years. However, while essential for practical deployments, the …