Navigating the Challenges and Opportunities of Securing Internet of Autonomous Vehicles with Lightweight Authentication

HI Ali, H Kurunathan, MH Eldefrawy, F Gruian… - IEEE …, 2025 - ieeexplore.ieee.org
The Internet of Things (IoT) can be defined as the network of physical objects, or" things,"
embedded with sensors and software for processing and exchanging data with other …

Low Complexity Encoding Design for Fiber Optic Measurement While Drilling Communication System Based on Superposition Spinal Codes

X Yu, L Liang, K Jiang, T Chen, S Du - IEEE Access, 2024 - ieeexplore.ieee.org
Fiber optic communication while drilling can transmit downhole geological and engineering
parameter data at high speed, serving as a crucial component of intelligent drilling …

[HTML][HTML] Design and Performance Analysis of a SPECK-Based Lightweight Hash Function

A Sevin, Ü Çavuşoğlu - Electronics, 2024 - mdpi.com
In recent years, hash algorithms have been used frequently in many areas, such as digital
signature, blockchain, and IoT applications. Standard cryptographic hash functions …

[HTML][HTML] Implementation of a Data-Parallel Approach on a Lightweight Hash Function for IoT Devices

A Sevin - Mathematics, 2025 - mdpi.com
The Internet of Things is used in many application areas in our daily lives. Ensuring the
security of valuable data transmitted over the Internet is a crucial challenge. Hash functions …

[PDF][PDF] A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities

MN Alatawi - Int. J. Comput. Netw. Appl, 2023 - ijcna.org
The proliferation of sensor networks and other Internet of Things devices has prompted
growing privacy and safety concerns. These devices have very little memory, computing …

Performance and Security Analysis of Lightweight Hash Functions in IoT

NF Mufidah, HH Nuha - Jurnal Informatika: Jurnal …, 2024 - ejournal.poltekharber.ac.id
The rapid proliferation of Internet of Things (IoT) devices across various sectors, including
healthcare, automotive, smart homes, and agriculture, has created a need for robust security …

Analysis on Success Factors for Improved User Search Through Comprehensive Locality Information

CG Charan, K Swaraj, D Gopichand… - … on Advances in …, 2024 - ieeexplore.ieee.org
An customized user-friendly website providing comprehensive information on hostels for
students attending colleges far from their hometowns. The website focuses on crucial details …

Um bloco de permutação para construções esponja: baseado na transformada do cosseno sobre corpos finitos de característica dois

LMR de Araújo, JB Lima… - Proceeding Series of …, 2025 - proceedings.sbmac.org.br
Neste trabalho, é proposto um novo bloco de permutação de comprimento (2+ n)× 32, em
que n é um número natural positivo, para utilização em construções esponja. Este bloco de …

Enhancing the Present Block Cipher for IoT Applications: Development and Comparative Analysis of a Lightweight Algorithm with Improved Key Schedule Algorithm

M Imdad - 2023 - search.proquest.com
Abstract The Internet of Things (IoT) has massive connectivity of resource-constrained
devices, and enormous data exchange between devices has made it susceptible to various …

An Evaluation of Hashing and Other Applied Cryptography Algorithms

A Mishra, Haripriya, A Sharma, JS Thomas - International Conference on …, 2023 - Springer
In the modern digital world, cryptography is critical in protecting personal statistics. Most of
the cryptography algorithms used to ease data, hashing, and other implemented …