Dec. 8, 2022, 2:18 a.m. | Yashar Salami, Vahid Khajehvand, Esmaeil Zeinali

cs.CR updates on arXiv.org arxiv.org

Today, with the development of blockchain and Internet of Things
technologies, we need authentication protocols and key exchanges to communicate
with these different technologies. Symmetric and asymmetric encryption methods
are used to design authentication and key exchange protocols, each of which has
different computation costs. In the Internet of Things systems, due to the
limited memory and computation power, researchers are looking the lightweight
design protocols so that the pressure caused by the computation of protocols
can be minimized. Calculating …

authentication communication computation exchange key protocol tool

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineering Professional

@ Nokia | India

Cyber Intelligence Exercise Planner

@ Peraton | Fort Gordon, GA, United States

Technical Lead, HR Systems Security

@ Sun Life | Sun Life Wellesley

SecOps Manager *

@ WTW | Thane, Maharashtra, India

Consultant Appels d'Offres Marketing Digital

@ Numberly | Paris, France