Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey.
Kübra SeyhanTu N. NguyenSedat AkleylekKorhan CengizPublished in: Clust. Comput. (2022)
Keyphrases
- resource constrained
- key management
- elliptic curve
- security mechanisms
- key distribution
- security problems
- rfid tags
- embedded systems
- resource constraints
- wireless sensor networks
- security protocols
- resource limitations
- sensor networks
- multipath
- private key
- secret key
- fuzzy vault
- public key cryptosystems
- security issues
- low cost
- information security
- sensor data
- intrusion detection
- lightweight
- cloud computing
- video sequences