In the modern Internet of Things (IoT) applications, the system entities collect security-sensitive information that must be cryptographically protected. In particular, authentication and integrity, as foundational security services, are essential for any IoT applications. Digital signatures provide both authentication and integrity to these applications. Nevertheless, once an IoT device is compromised, its signature private key is leaked to an adversary. Forward-secure digital signatures mitigate the impact of such key compromises by incorporating a key-evolving mechanism into the authentication process. However, existing forward-secure signatures suffer from large signature/key sizes, heavy computational overhead, and some prominent varia...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
In the modern Internet of Things (IoT) applications, the system entities collect security-sensitive ...
As an extension of the wired network, the use of the wireless communication network has considerably...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
Security in Industrial Internet of Things (IIoT) is of vital importance as there are some cases wher...
The Internet of Things envisages connecting all physical objects or things to the Internet, using d...
International audienceThe Internet of Things (IoT) is a network made up of a large number of devices...
Internet of Things (IoT) holds great promise for many life-improving applications like health-care s...
\u3cp\u3eWe introduce the forward secure signature scheme XMSS \u3csup\u3e+\u3c/sup\u3e and present ...
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitiv...
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived ...
5G provides a unified authentication architecture and access management for IoT (Internet of Things)...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...
In the modern Internet of Things (IoT) applications, the system entities collect security-sensitive ...
As an extension of the wired network, the use of the wireless communication network has considerably...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
Security in Industrial Internet of Things (IIoT) is of vital importance as there are some cases wher...
The Internet of Things envisages connecting all physical objects or things to the Internet, using d...
International audienceThe Internet of Things (IoT) is a network made up of a large number of devices...
Internet of Things (IoT) holds great promise for many life-improving applications like health-care s...
\u3cp\u3eWe introduce the forward secure signature scheme XMSS \u3csup\u3e+\u3c/sup\u3e and present ...
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitiv...
International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived ...
5G provides a unified authentication architecture and access management for IoT (Internet of Things)...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
In this paper, we propose a lightweight physical layer aided authentication and key agreement (PL-AK...
The popularity of personal computing devices (e.g. smart cards) exposes users to risks, notably iden...
Abstract. The devastating consequence of secret key exposure in digital signature is that any signat...