Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey.
Swati KumariManinder SinghRaman SinghHitesh TewariPublished in: Softw. Pract. Exp. (2022)
Keyphrases
- resource constrained
- secure communication
- key management
- mobile devices
- embedded systems
- security mechanisms
- resource constraints
- battery powered
- key technologies
- digital signature
- security protocols
- rfid tags
- wireless sensor networks
- sensor networks
- smart card
- secret key
- low cost
- sensor nodes
- secret sharing scheme
- information security
- secret sharing
- multipath
- elliptic curve
- energy consumption
- security issues
- lightweight
- mobile agent system
- public key