-
1
Optimizing Group Multi-Factor Authentication for Secure and Efficient IoT Device Communications
Published 2025-05-01Get full text
Article -
2
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01“…Selected as the winner of the National Institute of Standards and Technology (NIST) competition for lightweight encryption algorithms, ASCON ensures confidentiality and integrity through authenticated encryption with associated data (AEAD) tailored for resource-constrained environments. …”
Get full text
Article -
3
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme
Published 2025-03-01“… In this paper, we introduce AETHER, an authenticated encryption scheme that achieves ultra-high throughput and low energy consumption, supporting a 256- bit key and a 128-bit tag. …”
Get full text
Article -
4
Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption
Published 2023-04-01Get full text
Article -
5
Distributed and efficient identity authentication based on consortium blockchain
Published 2022-03-01“…Features and asymmetric encryption methods are used to improve the security and stability of the user identity authentication system. …”
Get full text
Article -
6
-
7
Full lifecycle security management scheme for terminal keys under power IoT
Published 2025-01-01“…The performance analysis shows that compared to the traditional access authentication and key management scheme based on logical key hierarchy, the scheme of this paper optimizes the terminal computation, reduces the computational overhead and simplifies the key update process. …”
Get full text
Article -
8
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework
Published 2025-03-01“…In this paper, we present MLOL, a novel AEAD algorithm based on the LOL framework. MLOL combines authenticated encryption with optimizations to the LFSR structure to enhance both security and efficiency. …”
Get full text
Article -
9
Research on Information Security Transmission of Port Multi-Thread Equipment Based on Advanced Encryption Standard and Preprocessing Optimization
Published 2024-12-01“…On this basis, in order to reduce the cost overhead generated by AES encryption, this paper used the pre-computed method of optimizing S-boxes and Mixcolumn matrices to be applied to the multithreaded control framework, which improved the computation rate of AES, and then it improved the efficiency of the information transmission in the multithreaded control process. …”
Get full text
Article -
10
A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes
Published 2025-06-01“…The modified Al-Biruni earth radius search optimization (MBERSO) algorithm is used to make the best keys for this EC-EC encryption scheme. …”
Get full text
Article -
11
Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus
Published 2025-05-01“…Each Electronic Control Unit (ECU) node independently performs compression, encryption, and authentication while periodically updating its keys to enhance system security and strengthen defense capabilities. …”
Get full text
Article -
12
A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption
Published 2025-01-01“…Homomorphic encryption (HE) addresses this problem by allowing direct computation on encrypted data without decryption. …”
Get full text
Article -
13
Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments
Published 2024-12-01“…The Tree-based Spider-Net Multipath (TBSNM) methodology is utilized, while an Advanced Encryption Standard (AES) technique is used to authenticate users. …”
Get full text
Article -
14
A Low-Cost PKC-Based RFID Mutual Authentication Protocol
Published 2013-10-01“…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
Get full text
Article -
15
Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE
Published 2024-01-01“…By dividing data into 42-bit blocks, it optimizes the encryption process, offering faster, more efficient data protection than conventional approaches. …”
Get full text
Article -
16
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
17
Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things
Published 2022-12-01“…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
Get full text
Article -
18
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the identity authentication stage, based on the residual Hash lemma and the signcryptic property, the message was signed and encrypted in one logical step at the same time, and the interaction flow of dot multiplication and Hash operation with low frequency was proposed to complete the access authentication performed by the group leader on behalf of the group members. …”
Get full text
Article -
19
A lightweight lattice-based group signcryption authentication scheme for Internet of things
Published 2024-04-01“…In the identity authentication stage, based on the residual Hash lemma and the signcryptic property, the message was signed and encrypted in one logical step at the same time, and the interaction flow of dot multiplication and Hash operation with low frequency was proposed to complete the access authentication performed by the group leader on behalf of the group members. …”
Get full text
Article -
20
A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash
Published 2016-02-01“…Since the RFID uses wireless channel for communication with its associated devices, there should be some optimal encryption methods to secure the communicating data from adversaries. …”
Get full text
Article