The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptographic hash functions are cryptographic primitives that provide data integrity services. However, due to the limitations of IoT devices, existing cryptographic hash functions are not suitable for all IoT environments. As a result, researchers have proposed various lightweight cryptographic hash function algorithms. In this paper, we discuss advanced lightweight cryptographic hash functions for highly constrained devices, categorize design trends, analyze cryptographic aspects and cryptanalytic attac...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, ...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibili...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) tech...
Conventional cryptographic techniques are inappropriate for resource-constrained applications in th...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, ...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibili...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) tech...
Conventional cryptographic techniques are inappropriate for resource-constrained applications in th...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
Abstract. As computing becomes pervasive, embedded systems are deployed in a wide range of domains, ...