نتایج جستجو برای: lightweight cryptography

تعداد نتایج: 58663  

2016
J. PREMALATHA K. SATHYA VANI RAJASEKAR

The emerging trend now in network security is lightweight cryptography which is due to the growth of wireless technology. Lightweight cryptography is defined as cryptographic algorithm used to achieve higher security with limited resources. Generally, these wireless systems are in demand of security and resource(power). In order to meet these constraints an important lightweight scheme called s...

2006
Hoon Wei Lim

This thesis examines the application of identity-based cryptography (IBC) in designing security infrastructures for grid applications. In this thesis, we propose a fully identity-based key infrastructure for grid (IKIG). Our proposal exploits some interesting properties of hierarchical identity-based cryptography (HIBC) to replicate security services provided by the grid security infrastructure...

2013
Jigang Wu Guozhi Song Jing Zhang Gongqing Wu Xuegang Hu Shiying Li Jizeng Wei Thambipillai Srikanthan Honglei Han Wenju Liu Guiyuan Jiang Xin Jin Yujian Li Yihua Zhou Wei Sun Jingmin Wang Meng Li Zhongping Yang Fei Lin Qian Yuan Zhong-ping Yang Jing Bai Jie Wang Xueying Zhang Chenming Sha Junwei Lei

ID-based public key cryptography is proposed to simplify the management of the certification process and greatly reduce the public key authentication computation as well as communication cost. Certified e-mail protocol is a fair exchange of a message for a receipt between two potentially mistrusting parties over the network. A number of certified e-mail protocols have been studied in recent yea...

Journal: :IJSN 2008
Panayiotis Kotzanikolaou Dimitrios D. Vergados Giannis Stergiou Emmanouil Magkos

Research on key establishment for Distributed Sensor Networks (DSNs) focuses on lightweight protocols that are feasible for the sensor nodes, which by default have restricted capabilities. Although the most efficient protocols for key establishment are based on symmetric key encryption, these protocols are unable to provide adequate security against attacks, such as node impersonation and fake ...

2007
JIANG Jun

In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial pro...

2015
Xinxin Fan Guang Gong

Hummingbird is a novel ultralightweight Cryptographic Algorithm aiming at resource-constrained devices. It has a hybrid structure of block cipher and stream cipher and was developed with both lightweight software and lightweight hardware implementations for constrained devices in mind. Moreover, Hummingbird has been shown to be resistant to the most common attacks to block ciphers and stream ci...

2016
R. Nandakumar

In the present era of e-world where security has got a larger weightage, cryptography has its role to play. Nowadays, the devices available in the market are of resource constrained type. Hence we need lightweight ciphers for the efficient encryption of data thereby increasing the performance. In this project a detailed study of HIGHT cryptographic algorithm is done which outperforms standard a...

A. Sadrmomtazi, J. Sobhani, M. A. Mirgozar, M. Ejtemaei,

Lightweight concrete (LWC) is a kind of concrete that made of lightweight aggregates or gas bubbles. These aggregates could be natural or artificial, and expanded polystyrene (EPS) lightweight concrete is the most interesting lightweight concrete and has good mechanical properties. Bulk density of this kind of concrete is between 300-2000 kg/m3. In this paper flexural strength of EPS is modeled...

2014
Oriol Piñol Piñol

Security is recently arising as an important issue for the Internet of Things (IoT). Efficient ways to provide secure communication between devices and sensors is crucial for the IoT devices, which are becoming more and more used and spread in a variety of fields. In this context, Elliptic Curve Cryptography (ECC) is considered as a strong candidate to provide security while being able to be fu...

Journal: :I. J. Circuit Theory and Applications 2017
Vladimir Rozic Oscar Reparaz Ingrid Verbauwhede

Security features such as privacy and device authentication are required in wireless sensor networks, electronic IDs, RFID tags and many other applications. These features are provided using cryptography. Symmetric key cryptography, where the key is distributed between the communication parties prior to communication, doesn’t provide adequate solution for large scalable systems such as sensor n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید