Peer-to-peer user identity verification time optimization in IoT Blockchain network

AR Kairaldeen, NF Abdullah, A Abu-Samah, R Nordin - Sensors, 2023 - mdpi.com
Blockchain introduces challenges related to the reliability of user identity and identity
management systems; this includes detecting unfalsified identities linked to IoT applications …

Modern and lightweight component-based symmetric cipher algorithms

SA Qassir, MT Gaata, AT Sadiq - ARO-The Scientific …, 2022 - eprints.koyauniversity.org
Information security, being one of the corner stones of network and communication
technology, has been evolving tremendously to cope with the parallel evolution of network …

[HTML][HTML] A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers

J Soto-Cruz, E Ruiz-Ibarra, J Vázquez-Castillo… - Technologies, 2024 - mdpi.com
Protecting sensitive data, such as data collected from sensors, is crucial for ensuring the
accurate assessment of sensing devices and preventing unauthorized access. In this regard …

[PDF][PDF] Theoretical background of cryptography

RM Al-Amri, DN Hamood, AK Farhan - Mesopotamian Journal of …, 2023 - iasj.net
Cryptography is the practice of secure communication and the study of secure
communication techniques. The theoretical foundations of cryptography include concepts …

[PDF][PDF] Designing a new lightweight AES algorithm to improve the security of the IoT environment

SA Jassim, AK Farhan - Iraqi J. Comput. Commun. Control. Syst. Eng, 2022 - iasj.net
Recently, the Internet of Things (IoT) is begin used in many fields such as smart homes,
healthcare systems, industrial applications, etc. Therefore, the use of the IoT led to a growth …

Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks

S Nandi, S Krishnaswamy, B Zolfaghari, P Mitra - Ieee Access, 2022 - ieeexplore.ieee.org
In this paper, we propose and evaluate a method for generating key-dependent feedback
configurations (KDFC) for-LFSRs.-LFSRs with such configurations can be applied to any …

Practical Improvement in the Implementation of Two Avalanche Tests to Measure Statistical Independence in Stream Ciphers

EJ Madarro-Capó, EC Ramos Piñón, G Sosa-Gómez… - Computation, 2024 - mdpi.com
This study describes the implementation of two algorithms in a parallel environment. These
algorithms correspond to two statistical tests based on the bit's independence criterion and …

LiCryptor: High-Speed and Compact Multi-Grained Reconfigurable Accelerator for Lightweight Cryptography

HL Pham, VTD Le, TH Vu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Emerging modern internet-of-things (IoT) systems require hardware development to support
multiple 8/32/64-bit lightweight cryptographic (LWC) algorithms with high speed and energy …

A Survey on IoT Security Using Cryptographic Algorithms

BM Sai, M Bhatia - E3S Web of Conferences, 2023 - e3s-conferences.org
The Internet of Things (IoT) is a system of interconnected materials that have software,
detectors, and network integration embedded that make it possible to gather information and …

A Nonlinear Stream Cipher for Encryption of Test Patterns in Streaming Scan Networks

J Rajski, M Trawka, J Tyszer… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the biennial doubling of the number of transistors in a given area of silicon,
contemporary integrated circuits (IC) are forging more and more often and will continue to …