Lightweight Cryptography for Network-on-Chip Data Encryption
نویسندگان
چکیده
منابع مشابه
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained devices. It is very costly to avoid nonce reuse in such environments, because this requires either a hardware source of randomness, or non-volatile memory to store a counter. At the same time, a lot of cryptographic schemes actually require the nonce assumption for their security. In this paper,...
متن کاملLightweight Encryption for Email
Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key generation, certification, and distribution have not been pragmatically addressed. We recently proposed a method for implementing a Lightweight Public Key Infrastructure (PKI) for email authentication using recent developments in identitybased cryptography and today’s e...
متن کاملReview on Encryption Ciphers of Cryptography in Network Security
With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential int...
متن کاملLightweight Symmetric Encryption Algorithm In Big Data
Comprehensive coverage of network has enabled many applications to be online. Growth in technology has produced IoT where almost every gadget is Internet enabled and this has produced massive data. Many data analytics tools and techniques have been developed to mine the data and get meaningful information out of it. With this sophisticated tools, there is a possibility that data are leaked, lea...
متن کاملHigh speed cryptography for network and disk encryption applications
In this thesis, new ideas in cryptography, cryptanalysis and designing high speed secure applications are presented. The Advanced Encryption Standard (AES) is used to demonstrate these ideas. In the eld of cryptography, new encryption models are proposed. In the eld of cryptanalysis, a secure key schedule for AES is presented together with new generalized attacks. These generalized attacks are ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: 1939-0122,1939-0114
DOI: 10.1155/2021/9943713