DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Joohee | ko |
dc.contributor.author | Kim, Duhyeong | ko |
dc.contributor.author | Lee, Hyungkyu | ko |
dc.contributor.author | Lee, Younho | ko |
dc.contributor.author | Cheon, Jung Hee | ko |
dc.date.accessioned | 2019-02-20T04:51:53Z | - |
dc.date.available | 2019-02-20T04:51:53Z | - |
dc.date.created | 2019-01-28 | - |
dc.date.created | 2019-01-28 | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | IEEE ACCESS, v.7, pp.2080 - 2091 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | http://hdl.handle.net/10203/250214 | - |
dc.description.abstract | We propose the RLizard key encapsulation mechanism (KEM), whose security depends on the ring learning with errors and ring learning with rounding problems. Because RLizard operates on a special type of ring, it is more efficient in terms of both the clock cycles required for key generation and the key size compared with the original Lizard scheme. To demonstrate the superiority of the proposed method over other well-known KEMs, we compared their performances in the 32-bit ARM Internet of Things (IoT) environment. The performance analysis showed that the RLizard KEM requires the fewest clock cycles for key generation, encapsulation, and decapsulation when the parameters are set to support a security level comparable with that of AES-128. In summary, the RLizard KEM is expected to be used for secure communication and authentication between IoT endpoint devices, whose computational power is generally limited. | - |
dc.language | English | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.title | RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices | - |
dc.type | Article | - |
dc.identifier.wosid | 000455696300001 | - |
dc.identifier.scopusid | 2-s2.0-85057855170 | - |
dc.type.rims | ART | - |
dc.citation.volume | 7 | - |
dc.citation.beginningpage | 2080 | - |
dc.citation.endingpage | 2091 | - |
dc.citation.publicationname | IEEE ACCESS | - |
dc.identifier.doi | 10.1109/ACCESS.2018.2884084 | - |
dc.contributor.nonIdAuthor | Lee, Joohee | - |
dc.contributor.nonIdAuthor | Kim, Duhyeong | - |
dc.contributor.nonIdAuthor | Lee, Younho | - |
dc.contributor.nonIdAuthor | Cheon, Jung Hee | - |
dc.description.isOpenAccess | Y | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Key encapsulation mechanism | - |
dc.subject.keywordAuthor | post-quantum cryptography | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordPlus | LATTICE-BASED CRYPTOGRAPHY | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordPlus | INTERNET | - |
dc.subject.keywordPlus | THINGS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.