Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey

被引:0
|
作者
Seyhan, Kübra [1 ]
Nguyen, Tu N. [2 ]
Akleylek, Sedat [1 ]
Cengiz, Korhan [3 ]
机构
[1] Department of Computer Engineering, Ondokuz Mayıs University, Samsun,55139, Turkey
[2] Department of Computer Science, Kennesaw State University, Marietta,GA,30060, United States
[3] Department of Electrical–Electronics Engineering, Trakya University, Edirne,22030, Turkey
来源
Cluster Computing | 2022年 / 25卷 / 03期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1729 / 1748
相关论文
共 50 条
  • [31] Towards Security Authentication for IoT Devices with Lattice-Based ZK
    Cai, Jie
    Jiang, Han
    Xu, Qiuliang
    Lv, Guangshi
    Zhao, Minghao
    Wang, Hao
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 141 - 150
  • [32] Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
    Tasopoulos, George
    Li, Jinhui
    Fournaris, Apostolos P.
    Zhao, Raymond K.
    Sakzad, Amin
    Steinfeld, Ron
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 432 - 451
  • [33] Performance and Applicability of Post-Quantum Digital Signature Algorithms in Resource-Constrained Environments
    Vidakovic, Marin
    Milicevic, Kruno
    ALGORITHMS, 2023, 16 (11)
  • [34] Lattice-Based Three Party Authenticated Key Agreement Scheme in Medical IoT for Post-Quantum Environment
    Ahmad, Arman
    Jagatheswari, S.
    IEEE ACCESS, 2024, 12 : 157247 - 157259
  • [35] Efficiency and Security Evaluation of Lightweight Cryptographic Algorithms for Resource-Constrained IoT Devices
    Radhakrishnan, Indu
    Jadon, Shruti
    Honnavalli, Prasad B.
    SENSORS, 2024, 24 (12)
  • [36] Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices
    Yasmin N.
    Gupta R.
    International Journal of Information Technology, 2024, 16 (4) : 2647 - 2659
  • [37] Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities
    Li, Shancang
    Song, Houbing
    Iqbal, Muddesar
    SENSORS, 2019, 19 (08):
  • [38] Backdooring Post-Quantum Cryptography: Kleptographic Attacks on Lattice-based KEMs
    Ravi, Prasanna
    Bhasin, Shivam
    Chattopadhyay, Anupam
    Aikata, Aikata
    Roy, Sujoy Sinha
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 216 - 221
  • [39] Fault Sensitivity Analysis of Lattice-Based Post-Quantum Cryptographic Components
    Valencia, Felipe
    Polian, Ilia
    Regazzoni, Francesco
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2019, 2019, 11733 : 107 - 123
  • [40] A New Lattice-Based Signature Scheme in Post-Quantum Blockchain Network
    Li, Chao-Yang
    Chen, Xiu-Bo
    Chen, Yu-Ling
    Hou, Yan-Yan
    Li, Jian
    IEEE ACCESS, 2019, 7 : 2026 - 2033