نتایج جستجو برای: lightweight cryptography

تعداد نتایج: 58663  

Journal: :IJMCMC 2016
Yassine Maleh Abdellah Ezzati

Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mos...

2016
Kwantae Cho Byungho Chung

A biometric sensor device is the potential product of the forthcoming biotechnology for real-time tracking of physiological signals to support various healthcare and medical services such as homecare medical service, prevention, diagnosis, and follow-up services. A key agreement scheme between biometric sensor devices is a fundamental requirement to support the security of the healthcare and me...

2016
Rafael Álvarez Juan Santonja Antonio Zamora

Public-key cryptography is too slow for general purpose encryption, with most applications limiting its use as much as possible. Some secure protocols, especially those that enable forward secrecy, make a much heavier use of public-key cryptography, increasing the demand for lightweight cryptosystems that can be implemented in low powered or mobile devices. This performance requirements are eve...

Journal: :Journal of Advanced Research in Natural and Applied Sciences 2022

Ad hoc networks have become more widespread and important because they support mobility can be used in different situations some difficult areas such as rescue missions, military, vehicular communications. Security is stated among the most significant challenges facing Hoc due to its characteristic features topology dynamicity, lack of infrastructure centralization, open architecture. work on b...

Journal: :IACR Cryptology ePrint Archive 2012
Markku-Juhani O. Saarinen Daniel W. Engels

Recent years have seen significant progress in the development of lightweight symmetric cryptoprimitives. The main concern of the designers of these primitives has been to minimize the number of gate equivalents (GEs) of the hardware implementation. However, there are numerous additional requirements that are present in real-life RFID systems. We give an overview of requirements emerging or alr...

Journal: :CoRR 2012
Dan Dobre Ghassan Karame Wenting Li Matthias Majuntke Neeraj Suri Marko Vukolic

We present PoWerStore, the first efficient robust storage protocol that achieves optimal latency without using digital signatures. PoWerStore’s robustness comprises tolerating asynchrony, maximum number of Byzantine storage servers, any number of Byzantine readers and crash-faulty writers, and guaranteeing wait-freedom and linearizability of read/write operations. Furthermore, PoWerStore’s effi...

Journal: :Integration 2011
Junfeng Fan Lejla Batina Ingrid Verbauwhede

This paper describes two novel architectures for a unified multiplier and inverter (UMI) in GF(2): the UMI merges multiplier and inverter into one unified data-path. As such, the area of the data-path is reduced. We present two options for hyperelliptic curve cryptography (HECC) using UMIs: an FPGAbased high-performance implementation (Type-I) and an ASIC-based lightweight implementation (Type-...

2016
Yassine Maleh Abdellah Ezzati

Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mos...

2006
Pietro Michiardi Refik Molva

This paper presents a message authentication scheme built on top of an original construct that combines a simple form of identity based cryptography with an iterated version of RSA. Our scheme blends the features of identity based cryptography and stream authentication while at the same time offering security comparable to that of the basic RSA cryptosystem. As opposed to other authentication s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید