Member
Publications
 
 
 
Filter by  
 
No filters to apply.
 
2024 
Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors

De Smet, R, Blancquaert, R, Godden, T, Steenhaut, K & Braeken, A 2024, 'Armed with Faster Crypto: Optimizing Elliptic Curve Cryptography for ARM Processors', Sensors, vol. 24, no. 3, 1030. https://doi.org/10.3390/s24031030

 
2022 
SHA 3 and Keccak variants computation speeds on constrained devices

Vandervelden, T, De Smet, R, Steenhaut, K & Braeken, A 2022, 'SHA 3 and Keccak variants computation speeds on constrained devices', Future Generation Computer Systems, vol. 128, pp. 28-35. https://doi.org/10.1016/j.future.2021.09.042

 
2021 
Lightweight PUF based authentication scheme for fog architecture

De Smet, R, Vandervelden, T, Steenhaut, K & Braeken, A 2021, 'Lightweight PUF based authentication scheme for fog architecture', Wireless Networks, vol. 27, no. 2, pp. 947-959. https://doi.org/10.1007/s11276-020-02491-0

 
2019 
Glycos: The Basis for a Peer-to-Peer, Private Online Social Network

De Smet, R, Dooms, A, Braeken, A & Pierson, J 2019, Glycos: The Basis for a Peer-to-Peer, Private Online Social Network. in E Kosta, J Pierson, D Slamanig, S Fischer-Hübner & S Krenn (eds), Privacy and Identity Management: Fairness, Accountability, and Transparency in the Age of Big Data. Springer Nature Switzerland AG, Cham, pp. 123-136, IFIP Summer School 2018 ‘Privacy and Identity Management’, Vienna, Austria, 23/08/18. https://doi.org/10.1007/978-3-030-16744-8_9, https://doi.org/10.1007/978-3-030-16744-8_9