Passwords constitute the main mean for authentication in computer systems. In order to maintain the user-related information at the service provider end, password hashing schemes (PHS) are utilized. The limited and old-fashioned solutions led the international cryptographic community to conduct the Password Hashing Competition (PHC). The competition will propose a small portfolio of schemes suitable for widespread usage until 2015. Embedded systems form a special application domain, utilizing devices with inherent computational limitations. Lightweight cryptography focuses in designing schemes for such devices and targets moderate levels of security. In this paper, a lightweight poly PHS suitable for lightweight cryptography is presented. A...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Part 5: Short PapersInternational audiencePasswords constitute the main mean for authentication in c...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, ...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
International audienceFor constrained devices, standard cryptographic algorithms can be too big, too...
Abstract. Password hashing is the common approach for maintaining users ’ password-related informati...
Abstract. We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges. Lyra2 wa...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Part 5: Short PapersInternational audiencePasswords constitute the main mean for authentication in c...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Computers are used in our everyday activities, with high volumes of users accessing provided service...
Summarization: Embedded systems are routinely deployed in critical infrastructures nowadays, therefo...
Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, ...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
International audienceFor constrained devices, standard cryptographic algorithms can be too big, too...
Abstract. Password hashing is the common approach for maintaining users ’ password-related informati...
Abstract. We present Lyra2, a password hashing scheme (PHS) based on cryptographic sponges. Lyra2 wa...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...