Results 61 to 70 of about 10,046 (210)
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
Quantum computing poses a threat on current cryptography methods, prompting initiatives such as the U.S. National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools.
Fouzia Samiullah +3 more
doaj +1 more source
Efficient Side-Channel Protections of ARX Ciphers
The current state of the art of Boolean masking for the modular addition operation in software has a very high performance overhead. Firstly, the instruction count is very high compared to a normal addition operation.
Bernhard Jungk +2 more
doaj +1 more source
Stand-alone wearable system for ubiquitous real-time monitoring of muscle activation potentials [PDF]
Wearable technology is attracting most attention in healthcare for the acquisition of physiological signals. We propose a stand-alone wearable surface ElectroMyoGraphy (sEMG) system for monitoring the muscle activity in real time.
Bianchini, E. +6 more
core +2 more sources
Recent proposals by Mahmood et al., Braeken et al., and Chaudhry et al. aimed at establishing secure communication in AMI, asserting their methods fulfil the requisite security criteria. This paper, however, reveals that each of these proposals exhibits security vulnerabilities and lacks sufficient features for deployment.
Ahmad Rahdari, Bahareh Akhbari
wiley +1 more source
The rapid expansion of the Industrial Internet of Things (IIoT) presents pressing challenges for secure, efficient, and privacy‐preserving communication among users, sensors, and cloud infrastructures. Existing lightweight authentication schemes, primarily based on classical cryptographic assumptions, are increasingly vulnerable to the emerging threat ...
Tinashe Magara +2 more
wiley +1 more source
Polynomial Multiplication in NTRU Prime
This paper proposes two different methods to perform NTT-based polynomial multiplication in polynomial rings that do not naturally support such a multiplication. We demonstrate these methods on the NTRU Prime key-encapsulation mechanism (KEM) proposed by
Erdem Alkim +10 more
doaj +3 more sources
KyberSlash: Exploiting secret-dependent division timings in Kyber implementations
This paper presents KyberSlash1 and KyberSlash2 – two timing vulnerabilities in several implementations (including the official reference code) of the Kyber Post-Quantum Key Encapsulation Mechanism, recently standardized as ML-KEM.
Daniel J. Bernstein +9 more
doaj +1 more source
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca +11 more
core +1 more source
IOT based Energy Meter Monitoring using ARM Cortex M4 with Android Application
Internet of Things (IOT) aims at interfacing different gadgets to the internet web – encouraging human-machine and machine-machine connections offering superior security, console and effectiveness. The concept of IOT is utilized in this model, remote monitoring of energy meter which is intended to overcome the issues in existing Automatic Meter Reading
U. B., Rashmi M.
openaire +1 more source
Emergency vehicles, such as ambulances, fire trucks, and police cars, play a crucial role in road traffic management. While these vehicles typically use sirens for identification, many drivers rely primarily on visual cues. This reliance presents challenges in scenarios where the emergency vehicles are obscured or outside the observer’s field of vision,
Rakshaa Munirathinam +2 more
wiley +1 more source

