Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
暂无分享,去创建一个
Sedat Akleylek | SK Hafizul Islam | Korhan Cengiz | Tu N. Nguyen | Kübra Seyhan | S. H. Islam | Korhan Cengiz | S. Akleylek | Kübra Seyhan
[1] Oded Regev,et al. Lattice-Based Cryptography , 2006, CRYPTO.
[2] Abed Ellatif Samhat,et al. Mobility Management With Session Continuity During Handover in LPWAN , 2020, IEEE Internet of Things Journal.
[3] Hanyi Zhang,et al. A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City , 2020, IEEE Internet of Things Journal.
[4] Xiaodong Wang,et al. Distributed Error Correction Coding Scheme for Low Storage Blockchain Systems , 2020, IEEE Internet of Things Journal.
[5] M. Majid Butt,et al. Agent-Based Modeling for Distributed Decision Support in an IoT Network , 2020, IEEE Internet of Things Journal.
[6] Jintai Ding,et al. A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem , 2019, C2SI.
[7] Tiago M. Fernandez-Carames,et al. From Pre-Quantum to Post-Quantum IoT Security: A Survey on Quantum-Resistant Cryptosystems for the Internet of Things , 2020, IEEE Internet of Things Journal.
[8] Xi Chen,et al. Batch-Assisted Verification Scheme for Reducing Message Verification Delay of the Vehicular Ad Hoc Networks , 2020, IEEE Internet of Things Journal.
[9] SK Hafizul Islam,et al. Provably secure two-party authenticated key agreement protocol for post-quantum environments , 2020, J. Inf. Secur. Appl..
[10] Yulei Wu,et al. FDC: A Secure Federated Deep Learning Mechanism for Data Collaborations in the Internet of Things , 2020, IEEE Internet of Things Journal.
[11] Danda B. Rawat,et al. Wireless Virtualization Architecture: Wireless Networking for Internet of Things , 2020, IEEE Internet of Things Journal.
[12] Jintai Ding,et al. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..
[13] Jintai Ding,et al. How to validate the secret of a Ring Learning with Errors (RLWE) key , 2018, IACR Cryptol. ePrint Arch..
[14] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[15] Sherali Zeadally,et al. Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions , 2019, IEEE Internet of Things Journal.
[16] Sedat Akleylek,et al. A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys , 2020, IEEE Access.
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Jintai Ding,et al. Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption , 2019, IACR Cryptol. ePrint Arch..
[19] Zilong Liu,et al. A Flexible and Generic Gaussian Sampler With Power Side-Channel Countermeasures for Quantum-Secure Internet of Things , 2020, IEEE Internet of Things Journal.
[20] Zheng Yang,et al. Randomized authentication primitive problem in key exchange with strong security , 2017, J. Inf. Secur. Appl..
[21] Daniele Micciancio. Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.
[22] Chris Peikert,et al. A Decade of Lattice Cryptography , 2016, Found. Trends Theor. Comput. Sci..
[23] Chunsheng Gu,et al. Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement , 2018, Cluster Computing.
[24] Xiaojiang Du,et al. Blockchain-Enhanced High-Confidence Energy Sharing in Internet of Electric Vehicles , 2020, IEEE Internet of Things Journal.
[25] Gil Segev,et al. Public-Key Cryptographic Primitives Provably as Secure as Subset Sum , 2010, TCC.