2019
DOI: 10.1109/jiot.2019.2903082
|View full text |Cite
|
Sign up to set email alerts
|

Post-Quantum Cryptoprocessors Optimized for Edge and Resource-Constrained Devices in IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
83
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(83 citation statements)
references
References 25 publications
0
83
0
Order By: Relevance
“…[25] that included a feedback loop and iterative architecture, which occupied fewer areas and required more clock cycles. To make a fair comparison with [25], AT = area × time has been calculated, which is a common and wide measurement in literature, including [31]. As the proposed cryptosystem has been tested by 688 × 576 pixels images, the encryption time in [25] has been manually calculated, and it is equal to 507 µs (for the proposed design it is equal to 40 µs).…”
Section: Implementation Results Simulation and Comparisonmentioning
confidence: 99%
“…[25] that included a feedback loop and iterative architecture, which occupied fewer areas and required more clock cycles. To make a fair comparison with [25], AT = area × time has been calculated, which is a common and wide measurement in literature, including [31]. As the proposed cryptosystem has been tested by 688 × 576 pixels images, the encryption time in [25] has been manually calculated, and it is equal to 507 µs (for the proposed design it is equal to 40 µs).…”
Section: Implementation Results Simulation and Comparisonmentioning
confidence: 99%
“…If isogeny is separable between two curves, we say that they are isogenous [ 41 ]. Tate’s theorem [ 42 , 43 ] is that two curves over are isogenous if and only if . An isogeny can be identified by its kernel in such a way that for every finite subgroup G of , there is a unique and a separable isogeny φ: with kernel G such that φ: .…”
Section: Lightweight Postquantum Signature Scheme For Ioementioning
confidence: 99%
“…Also, there are many efforts for implementing these schemes in low-processing capacity microcontrollers such as 8 bit and 32 bit ARM processors. Ebrahimi et al 49 proposed the InvRBLWE scheme that is secure against quantum-based attacks that can be used in resource-constrained nodes. Shahid et al 50 proposes a distributed ledger scheme, such as the ones used for secure transactions of crypto-currencies, based on a one-time signature that offers low energy consumption and is adapted for IoT nodes.…”
Section: Post-quantum Security In Iot Networkmentioning
confidence: 99%