Widespread deployment of mobile and embedded devices in everyday use has brought up not only new concepts and application areas such as Internet-of-Things (IoT) but also several security and privacy problems. In theory, it is possible to mitigate most of these problems by implementing well-known and standardized security algorithms and techniques on IoT devices. However, in practice, it is rather difficult, if not impossible, to implement standard security algorithms on these devices due to their limited resources and processing power. Instead, algorithms specifically tailored for such devices, which are also known as lightweight algorithms, are favored. In this thesis, we will investigate the suitability and adaptability of the lightweight...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
We witness massive implementations of the Internet of Things (IoT) in smart homes, smart buildings, ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze colle...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
Technology is evolving rapidly and with technology, the internet is also changing. People used to us...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
We witness massive implementations of the Internet of Things (IoT) in smart homes, smart buildings, ...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze colle...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
International audienceCryptographic algorithms that can provide both encryption and authentication a...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
Technology is evolving rapidly and with technology, the internet is also changing. People used to us...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...