نتایج جستجو برای: lightweight cryptographic primitives

تعداد نتایج: 49629  

2010
Andrey Bogdanov

Project co-funded by the European Commission within the 7th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...

2005
David Chau

LTA is a lightweight trust architecture that fights phishing attacks by authenticating e-mail messages. LTA uses separable identity-based ring signatures, which are more attractive than traditional digital signatures for e-mail signing. Because the signatures are identity-based, users do not need to generate keys ahead of time. And because the ring signatures are repudiable, users do not need t...

Journal: :IACR Cryptology ePrint Archive 2014
Meltem Sönmez Turan René Peralta

A generic way to design lightweight cryptographic primitives is to construct simple rounds using small nonlinear components such as 4x4 S-boxes and use these iteratively (e.g., PRESENT [1] and SPONGENT [2]). In order to efficiently implement the primitive, efficient implementations of its internal components are needed. Multiplicative complexity of a function is the minimum number of AND gates ...

2016
Upinder Kaur

Nearest neighbor search is one of the most fundamental queries on massive datasets, and it has extensive applications such as pattern recognition, statistical classification, graph algorithms, Location-Based Services and online recommendations. In this report, we propose a new searchable scheme, which can efficiently and securely enable nearest neighbor search over encrypted data on untrusted n...

2010
Simon Knellwolf Willi Meier María Naya-Plasencia

Non-linear feedback shift registers are widely used in lightweight cryptographic primitives. For such constructions we propose a general analysis technique based on differential cryptanalysis. The essential idea is to identify conditions on the internal state to obtain a deterministic differential characteristic for a large number of rounds. Depending on whether these conditions involve public ...

Journal: :IACR Cryptology ePrint Archive 2012
Julia Borghoff

In this paper we present a rather new approach to apply mixed-integer optimization to the cryptanalysis of cryptographic primitives. We focus on the stream cipher Trivium, that has been recommended by the eSTREAM stream cipher project, and the lightweight block cipher Ktantan. Using these examples we explain how the problem of solving a non-linear multivariate Boolean equation system can be for...

Journal: :IACR Cryptology ePrint Archive 2015
Ege Gulcan Aydin Aysu Patrick Schaumont

There is a significant effort in building lightweight cryptographic operations, yet the proposed solutions are typically singlepurpose modules that can implement a single functionality. In contrast, we propose BitCryptor, a multi-purpose, bit-serialized compact processor for cryptographic applications on reconfigurable hardware. The proposed crypto engine can perform pseudo-random number genera...

2013
Jan Hajny Lukas Malina Zdenek Martinasek Ondrej Tethal

The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smartphones. The goal of the paper is to analyze the demands of today’s common theoretical cryptographic constructions used in privacy-enhancing schemes and to find out whether they can be practically implemented on off-the-shelf hardware. We evaluate the performance of all major...

Journal: :IEEE Access 2021

With technology evolving rapidly and proliferating, it is imperative to pay attention mobile devices’ security being currently responsible for various sensitive data processing. This phase essential as an intermediate before the cloud or distributed ledger storage delivery should be considered additional care due its inevitability. paper analyzes mechanisms applied internal use in Android OS co...

Journal: :Mathematics 2023

Considering the resource limitations of low-cost wireless sensors, there is a growing inclination to utilize cryptographic primitives that are optimized for efficiency, such as symmetric key encryption/decryption and hash functions, when designing authentication schemes. However, lightweight scheme can meet various security requirements poses significant challenge. In recent years, numerous sch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید