While numerous digital signature schemes exist in the literature, most real-world system rely on RSA-based signature schemes or on the digital signature algorithm (DSA), including its elliptic curve cryptography variant ECDSA. In this position paper we review a family of alternative signature schemes, based on hash functions, and we make the case for their application in Internet of Things (IoT) settings. Hash-based signatures provide postquantum security, and only make minimal security assumptions, in general requiring only a secure cryptographic hash function. This makes them extremely flexible, as they can be implemented on top of any hash function that satisfies basic security properties. Hash-based signatures also feature numerous para...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived ...
In this thesis we study how hash chains and other hash structures can be used in various cryptograph...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitiv...
5G provides a unified authentication architecture and access management for IoT (Internet of Things)...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Internet of things (IoT) is the next big revolution in modernized network technologies connecting a ...
Digital signatures are one of the most important cryptographic primitives in practice. They are an e...
With rapid deployment of Internet-of-Things (IoT) devices, security issues related to data transmitt...
In the modern Internet of Things (IoT) applications, the system entities collect security-sensitive ...
In the previous couple of years, the internet of things (IoT) is gaining additional and a lot of att...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived ...
In this thesis we study how hash chains and other hash structures can be used in various cryptograph...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitiv...
5G provides a unified authentication architecture and access management for IoT (Internet of Things)...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
Cryptographers and security experts around the world have been awakened to the reality that one day ...
Internet of things (IoT) is the next big revolution in modernized network technologies connecting a ...
Digital signatures are one of the most important cryptographic primitives in practice. They are an e...
With rapid deployment of Internet-of-Things (IoT) devices, security issues related to data transmitt...
In the modern Internet of Things (IoT) applications, the system entities collect security-sensitive ...
In the previous couple of years, the internet of things (IoT) is gaining additional and a lot of att...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
The upcoming quantum era is believed to be an end for the elliptic curve digital signature algorithm...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived ...
In this thesis we study how hash chains and other hash structures can be used in various cryptograph...