© 2021

Security of Ubiquitous Computing Systems

Selected Topics

  • Gildas Avoine
  • Julio Hernandez-Castro
  • Ubiquitous computing systems require new approaches to security

  • Result of the successful EU Horizon 2020 Cost Action project Cryptacus

  • Contributions from top-class researchers in security and cryptography

Open Access

Table of contents

  1. Front Matter
    Pages i-xviii
  2. Introduction

    1. Front Matter
      Pages 1-1
    2. Mirosław Kutyłowski, Piotr Syga, Moti Yung
      Pages 3-18 Open Access
  3. Lightweight Cryptographic Primitives

    1. Front Matter
      Pages 19-19
    2. Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, Miodrag J. Mihaljević
      Pages 21-47 Open Access
    3. Vasily Mikhalev, Miodrag J. Mihaljević, Orhun Kara, Frederik Armknecht
      Pages 49-62 Open Access
  4. Authentication Protocols

    1. Front Matter
      Pages 79-79
    2. Lucjan Hanzlik, Mirosław Kutyłowski
      Pages 81-97 Open Access
    3. Xavier Carpent, Paolo D’Arco, Roberto De Prisco
      Pages 99-112 Open Access
    4. Gildas Avoine, Ioana Boureanu, David Gérault, Gerhard P. Hancke, Pascal Lafourcade, Cristina Onete
      Pages 113-130 Open Access
  5. Hardware Implementation and Systems

    1. Front Matter
      Pages 131-131
    2. Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek
      Pages 133-145 Open Access
    3. Apostolos P. Fournaris, Athanassios Moschos, Nicolas Sklavos
      Pages 147-163 Open Access
    4. Darren Hurley-Smith, Julio Hernandez-Castro
      Pages 165-181 Open Access
    5. Aurélien Francillon, Sam L. Thomas, Andrei Costin
      Pages 183-197 Open Access
  6. Privacy and Forensics

    1. Front Matter
      Pages 199-199
    2. Agusti Solanas, Edgar Batista, Fran Casino, Achilleas Papageorgiou, Constantinos Patsakis
      Pages 201-213 Open Access
    3. Sasa Mrdovic
      Pages 215-229 Open Access
  7. Back Matter
    Pages 231-265

About this book


The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. 

The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. 

This book is open access under a CC BY license.


Cryptology Cryptacus Security Ubiquitous Devices Lightweight Cryptography Symmetric Cryptography Side-Channel Analysis IoT Security Ubiquitous Computing Systems Open Access

Editors and affiliations

  • Gildas Avoine
    • 1
  • Julio Hernandez-Castro
    • 2
  1. 1.Institut National des Sciences AppliquéesRennesFrance
  2. 2.University of KentCanterburyUK

Bibliographic information

Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment