Research on the criteria of cryptographic resistant of continuous encryption algorithms

D Akbarov, S Umarov, M Turdimatov… - E3S Web of …, 2024 - e3s-conferences.org
The article examines the features of the criteria for the strength of continuous encryption
algorithms. The general properties of the models of algorithms of the continuous encryption …

Efficient braille transformation for secure password hashing

H Touil, N El Akkad, K Satori, NF Soliman… - IEEE …, 2024 - ieeexplore.ieee.org
In this work, we propose a novel approach to enhancing the security of passwords before
storing them in databases. Our method utilizes Braille transformation to encrypt the …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for iot client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

[PDF][PDF] New efficient cryptographic techniques for cloud computing security

M Kaleem, MA Mushtaq, U Jamil, SA Ramay… - Migration …, 2024 - researchgate.net
The exponential expansion of Cloud computing has resulted in a solution revolution within
data storage and employ, but it has also increased security concerns. Typically, traditional …

Two new lightweight cryptographic hash functions based on saturnin and beetle for the Internet of Things

S Windarta, S Suryadi, K Ramli, AA Lestari… - IEEE …, 2023 - ieeexplore.ieee.org
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared
among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial …

A Survey on Cybersecurity in IoT.

E Dritsas, M Trigka - Future Internet, 2025 - search.ebscohost.com
The proliferation of the Internet of Things (IoT) has transformed the digital landscape,
enabling a vast array of interconnected devices to communicate and share data seamlessly …

Blockchain-Enabled Secure Device-to-Device Communication in Software-Defined Networking

D Das, U Ghosh, N Evans… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) continues to increase the demand for seamless communication
among IoT devices. The rapid growth of IoT devices has led to an exponential increase in …

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

AT Mozipo, JM Acken - IET Computers & Digital Techniques, 2023 - Wiley Online Library
The protection of communications between Internet of Things (IoT) devices is of great
concern because the information exchanged contains vital sensitive data. Malicious agents …

A hybrid encryption approach for efficient and secure data transmission in IoT devices

L Zhang, L Wang - Journal of Engineering and Applied Science, 2024 - Springer
Security is a crucial concern in the Internet of Things (IoT) ecosystem. Due to IoT devices'
constrained processing and storage resources, providing reliable security solutions is …

H2B: Crypto Hash Functions Based on Hybrid Ring Generators

J Rajski, M Trawka, J Tyszer… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Protection of integrated circuits (ICs) against hardware security threats has been tackled by
many schemes proposed to mitigate risks associated with an unauthorized access and …