Results 61 to 70 of about 10,046 (210)

Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT

open access: yesIEEE Open Journal of the Communications Society
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah   +3 more
doaj   +1 more source

Efficient Side-Channel Protections of ARX Ciphers

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
The current state of the art of Boolean masking for the modular addition operation in software has a very high performance overhead. Firstly, the instruction count is very high compared to a normal addition operation.
Bernhard Jungk   +2 more
doaj   +1 more source

Stand-alone wearable system for ubiquitous real-time monitoring of muscle activation potentials [PDF]

open access: yes, 2018
Wearable technology is attracting most attention in healthcare for the acquisition of physiological signals. We propose a stand-alone wearable surface ElectroMyoGraphy (sEMG) system for monitoring the muscle activity in real time.
Bianchini, E.   +6 more
core   +2 more sources

SKE2SG: A Secure Key Establishment Scheme for Smart Grid Cyber‐Physical Systems Based on Elliptic Curve Cryptography

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley   +1 more source

PQ‐AuthN‐IIoT: A Lightweight, LWE‐Based Postquantum and Privacy‐Preserving Mutual Authentication Scheme for Resource‐Constrained Industrial IoT Systems

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara   +2 more
wiley   +1 more source

Polynomial Multiplication in NTRU Prime

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by
Erdem Alkim   +10 more
doaj   +3 more sources

KyberSlash: Exploiting secret-dependent division timings in Kyber implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM.
Daniel J. Bernstein   +9 more
doaj   +1 more source

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

open access: yes, 2017
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca   +11 more
core   +1 more source

IOT based Energy Meter Monitoring using ARM Cortex M4 with Android Application

open access: yesInternational Journal of Computer Applications, 2016
Internet of Things (IOT) aims at interfacing different gadgets to the internet web – encouraging human-machine and machine-machine connections offering superior security, console and effectiveness. The concept of IOT is utilized in this model, remote monitoring of energy meter which is intended to overcome the issues in existing Automatic Meter Reading
U. B., Rashmi M.
openaire   +1 more source

Hybrid and Depth Separable Convolutional Neural Network Approaches for an Efficient and Accurate Siren Recognition With Resource Limited Devices

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Emergency vehicles, such as ambulances, fire trucks, and police cars, play a crucial role in road traffic management. While these vehicles typically use sirens for identification, many drivers rely primarily on visual cues. This reliance presents challenges in scenarios where the emergency vehicles are obscured or outside the observer’s field of vision,
Rakshaa Munirathinam   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy