IoT Evaluations
- A Flexible and Generic Gaussian Sampler With Power Side-Channel Countermeasures for Quantum-Secure Internet of Things: CDT sampler providing high hardware flexibility, side-channel security, and suitability for resource-constrained IoT nodes. [ZLC20]
- A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things: First assembler-optimized implementation of Streamlined NTRU Prime for an 8-bit AVR microcontroller. [CDG20]
- A Study on Transmission Overhead of Post Quantum Cryptography Algorithms in Internet of Things Networks: Analysis of the overhead associated with the wireless transmission of post quantum cryptography algorithms through the Internet of Things networks. [ATK19]
- A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks: Analysis of post-quantum cryptographic techniques for securing IoT networks. [LLJ20]
- Evaluating Kyber post-quantum KEM in a mobile application: Evaluation of Kyber KEM running on an Android mobile application. [dRd21]
- From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things: Challenges for PQC in IoT and comparison of the performance of PQC algorithms [F20]
- Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey: Examination of fundamental characteristics of IoT environments with focus on the post-quantum security. [SNA21]
- Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes: Investigation of the use of the XMSS scheme targeting constrained devices (IoT). [GMS19]
- Mobile Energy Requirements of the Upcoming NIST Post-Quantum Cryptography Standards: Energy requirement analysis based on extensive measurements of PQC candidate algorithms on a Cortex M4-based reference platform. [O20]
- Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor: Analysis from a practical implementation of the Kyber768 CPAPKE public key encryption component on a MULTOS IoT Trust-Anchor chip. [M20]
- Requirements for Post-Quantum Cryptography on Embedded Devices in the IoT: Discussion on PQC on resources restricted devices and hints on achieving a fitting solution. [D21]
- Saber Post-Quantum Key Encapsulation Mechanism (KEM): Evaluating Performance in Mobile Devices and Suggesting Some Improvements: Analysis of Saber performance in x64 and ARM architectures. [LJd21]
- Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography: Discussion of the suitability of lattice-based cryptosystems for resource-constrained devices, outlining efficient implementations for 8 and 32-bit microcontrollers. [LCG18]
- Towards lightweight Identity-Based Encryption for the post-quantum-secure Internet of Things: Adopting an RLWE problem based IBE scheme for two security levels on ARM Cortex-M. [GO17]
- Towards post-quantum security for IoT endpoints with NTRU: Comparison of four different NTRUEncrypt implementations on an ARM Cortex M0-based microcontroller. [GPB17]
Last modified February 12, 2022