Open Access
Issue
E3S Web Conf.
Volume 448, 2023
The 8th International Conference on Energy, Environment, Epidemiology and Information System (ICENIS 2023)
Article Number 02047
Number of page(s) 11
Section Information System
DOI https://doi.org/10.1051/e3sconf/202344802047
Published online 17 November 2023
  1. I. Keshta, ‘AI-driven IoT for smart health care: Security and privacy issues’, Informatics in Medicine Unlocked, vol. 30, p. 100903, 2022, doi: 10.1016/j.imu.2022.100903. [CrossRef] [Google Scholar]
  2. S. Akleylek and M. Soysaldı, ‘A new lattice-based authentication scheme for IoT’, Journal of Information Security and Applications, vol. 64, p. 103053, Feb. 2022, doi: 10.1016/j.jisa.2021.103053. [CrossRef] [Google Scholar]
  3. O. S. Guma’a, Q. M. Hussein, and Z. T. M. Al-Ta’i, ‘Q-NTRU Cryptosystem for IoT Applications’, Journal of Southwest Jiaotong University, vol. 54, no. 4, p. 15, 2019, doi: 10.35741/issn.0258-2724.54.4.15. [CrossRef] [Google Scholar]
  4. K. Shahbazi and S.-B. Ko, ‘Area and power efficient post-quantum cryptosystem for IoT resource-constrained devices’, Microprocessors and Microsystems, vol. 84, p. 104280, Jul. 2021, doi: 10.1016/j.micpro.2021.104280. [CrossRef] [Google Scholar]
  5. L. Chen et al., ‘Report on Post-Quantum Cryptography’, National Institute of Standards and Technology, NIST IR 8105, Apr. 2016. doi: 10.6028/NIST.IR.8105. [Google Scholar]
  6. D. Toradmalle, R. Singh, H. Shastri, N. Naik, and V. Panchidi, ‘Prominence Of ECDSA Over RSA Digital Signature Algorithm’, in 2018 2nd International Conference on I- SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, Palladam, India: IEEE, Aug. 2018, pp. 253–257. doi: 10.1109/I-SMAC.2018.8653689. [Google Scholar]
  7. A. Chandrasekar, V. R. Rajasekar, and V. Vasudevan, ‘Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography’, p. 10, 2009. [Google Scholar]
  8. B. Harjito, H. N. Tyas, E. Suryani, and D. W. Wardani, ‘Comparative Analysis of RSA and NTRU Algorithms and Implementation in the Cloud’, IJACSA, vol. 13, no. 3, 2022, doi: 10.14569/IJACSA.2022.0130321. [CrossRef] [Google Scholar]
  9. Cherckesova, O. Safaryan, P. Razumov, V. Kravchenko, S. Morozov, and A. Popov, ‘Post-Quantum Cryptosystem NTRUEnCrypt and Its Advantage over Pre – Quantum Cryptosystem RSA’, E3S Web Conf., vol. 224, p. 01037, 2020, doi: 10.1051/e3sconf/202022401037. [CrossRef] [EDP Sciences] [PubMed] [Google Scholar]
  10. A. Karki, ‘A Comparative Analysis of Public Key Cryptography’, International journal of modern computer science, vol. 4, no. 6, p. 6, 2016. [Google Scholar]
  11. I. Upasana, N. Nandanavanam, A. Nandanavanam, and N. Naaz, ‘Performance Characteristics of NTRU and ECC Cryptosystem in context of IoT Environment’, in 2020 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), Udupi, India: IEEE, Oct. 2020, pp. 23–28. doi: 10.1109/DISCOVER50404.2020.9278074. [Google Scholar]
  12. M. Zhan, Y. Li, G. Yu, B. Li, and W. Wang, ‘Detecting DNS over HTTPS based data exfiltration’, Computer Networks, vol. 209, p. 108919, May 2022, doi: 10.1016/j.comnet.2022.108919. [CrossRef] [Google Scholar]
  13. S. Nakov, Practical Cryptography for Developers. Sofia, 2018. [Online]. Available: https://cryptobook.nakov.com/ [Google Scholar]
  14. D. R. Stinson and M. B. Paterson, Cryptography Theory and Practice Fourth Edition, 4th ed. CRC Press, 2018. [Google Scholar]
  15. Oracle, ‘RFID Implementation’, Oracle® Warehouse Management Implementation Guide, 2022. https://docs.oracle.com/cd/E18727_01/doc.121/e13434/T210618T211205.htm (accessed Jan. 06, 2022). [Google Scholar]
  16. T. Jager, J. Schwenk, and J. Somorovsky, ‘Practical Invalid Curve Attacks on TLS- ECDH’, in Computer Security -- ESORICS 2015, G. Pernul, P. Y A Ryan, and E. Weippl, Eds., in Lecture Notes in Computer Science, vol. 9326. Cham: Springer International Publishing, 2015, pp. 407–425. doi: 10.1007/978-3-319-24174-6_21. [Google Scholar]
  17. J. Bi and L. Han, ‘Lattice Attacks on NTRU Revisited’, IEEE Access, vol. 9, pp. 66218–66222, 2021, doi: 10.1109/ACCESS.2021.3076598. [CrossRef] [Google Scholar]
  18. T. Plantard, W. Susilo, and Z. Zhang, ‘LLL for ideal lattices: re-evaluation of the security of Gentry–Halevi’s FHE scheme’, Des. Codes Cryptogr., vol. 76, no. 2, pp. 325–344, Aug. 2015, doi: 10.1007/s10623-014-9957-1. [CrossRef] [Google Scholar]
  19. J. Hoffstein, J. Pipher, J. M. Schanck, J. H. Silverman, W. Whyte, and Z. Zhang, ‘Choosing Parameters for NTRUEncrypt’, in Topics in Cryptology – CT-RSA 2017, H. Handschuh, Ed., in Lecture Notes in Computer Science, vol. 10159. Cham: Springer International Publishing, 2017, pp. 3–18. doi: 10.1007/978-3-319-52153-4_1. [CrossRef] [Google Scholar]
  20. D. Moody, ‘Recommendations for Discrete Logarithm-based Cryptography:: Elliptic Curve Domain Parameters, National Institute of Standards and Technology, Gaither [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.