2017
DOI: 10.1109/mcom.2017.1600522cm
|View full text |Cite
|
Sign up to set email alerts
|

Securing the Internet of Things in a Quantum World

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
102
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 184 publications
(104 citation statements)
references
References 13 publications
0
102
0
2
Order By: Relevance
“…In the proposed DNA elliptical cryptography, standard elliptical curve parameters and methods have been chosen. Existing works in elliptical cryptography have shown its resilience towards timing and simple power analysis (SPA) attacks . The elliptical cryptography produces random data after decryption without a proper authentication key.…”
Section: Security Performancementioning
confidence: 99%
See 1 more Smart Citation
“…In the proposed DNA elliptical cryptography, standard elliptical curve parameters and methods have been chosen. Existing works in elliptical cryptography have shown its resilience towards timing and simple power analysis (SPA) attacks . The elliptical cryptography produces random data after decryption without a proper authentication key.…”
Section: Security Performancementioning
confidence: 99%
“…Therefore, encryption schemes for IoT systems need to be less complicated, and should function with reduced memory usage, which is dependent on the key size. Compared to conventional systems, elliptical curve cryptography (ECC) can statistically provide stronger security with a smaller key size, thus making it a suitable alternative for IoT devices . The strength of elliptical cryptography relies on the fact that the output of the decryption operation will be ambiguous without a proper authentication key.…”
Section: Introductionmentioning
confidence: 99%
“…Algorithms include NTRU/NTRUEncrypt for encryption, Bimodal Lattice Signature Scheme (BLISS) for signatures, and Learning with Errors (LWE) algorithms for key exchange. The approaches have been considered energy efficient [31].…”
Section: Lattice-basedmentioning
confidence: 99%
“…The proposed algorithms include Tame Transformation Signatures (TTS), Rainbow, and Hidden Fields Equations (HFE). The multivariate approaches have been considered energy efficient [31].…”
Section: Multivariatementioning
confidence: 99%
“…The problem of symmetric cryptography is related to not having reliable key distribution, whereas the problem of the common asymmetric cryptography is not the key distribution, but not being quantum-resistant, that is, it can be easily broken by algorithms run on quantum computers. However, there exist classical crypto methods not having such drawbacks, i.e., being assumed to be completely secure (Cheng, 2017). Although secure nowadays, the latter, for their being computational-complexity-based, could in some future instant of time be broken by discovering appropriate algorithms.…”
Section: Introductionmentioning
confidence: 99%