Machine learning cryptography methods for IoT in healthcare

T Chinbat, S Madanian, D Airehrour… - BMC Medical Informatics …, 2024 - Springer
Background The increased application of Internet of Things (IoT) in healthcare, has fueled
concerns regarding the security and privacy of patient data. Lightweight Cryptography …

Symmetric cryptography using multiple access circular queues (MACQ)

S Phull, S Som - Proceedings of the Second International Conference …, 2016 - dl.acm.org
In order to provide secure data communication in present cyber space world, a stronger
encryption technique becomes a necessity that can help people to protect their sensitive …

Symkrypt: A general-purpose and lightweight symmetric-key cryptography

R Patgiri - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Symmetric-key cryptography is used widely due to its capability to provide a strong defense
against diverse attacks; however, it is prone to cryptanalysis attacks. Therefore, we propose …

[PDF][PDF] Performance Evaluation of Lightweight Cryptographic Algorithms for IoT in Healthcare

T Chinbat - 2022 - openrepository.aut.ac.nz
The significant number of objects interconnected to the Internet has grown as the Internet
has become a more critical aspect of today's society. Network access, such as the Internet, is …

symKrypt: A Lightweight Symmetric-Key Cryptography for Diverse Applications

R Patgiri - International Conference on Computer and Information …, 2022 - Springer
Symmetric-key cryptography is used widely due to its capability to provide a strong defense
against diverse attacks; however, it is prone to cryptanalysis attacks. Therefore, we propose …

[PDF][PDF] A comparison of lightweight Ciphers Meeting NIST lightweight cryptography requirements to the advanced encryption standard

J Figueroa-Hernandez Jr - 2019 - scholarworks.calstate.edu
As the Internet has become a major part of a person's daily life, the type of devices
connected to the Internet has expanded. Network access, including the Internet, is no longer …

[PDF][PDF] Muli-operation Data Encryption Mechanism Using Dynamic Data Blocking and Randomized Substitution

IA Shoukat - 2016 - core.ac.uk
Existing cryptosystems deal with static design features such as fixed sized data blocks, static
substitution and apply identical set of known encryption operations in each encryption …