نتایج جستجو برای: lightweight cryptography

تعداد نتایج: 58663  

2013
Firoz Ahmed Siddiqui Ranjeet Kumar

Light weight cryptography (LWC) is an emerging research area which has to deal with the trade-off among security, cost, and performance. In this paper we present the idea and list some types of LWC algorithms. Hummingbird is a novel ultra lightweight cryptographic algorithm targeted for resource constrained devices like RFID tags, smart cards and wireless sensor nodes. The hybrid model of Hummi...

2005
Lin Cai Jianping Pan Xuemin Shen Jon W. Mark

Voluntary peer collaboration is often assumed in media access, route discovery, packet forwarding, and upper-layer protocols for wireless ad hoc networks. This assumption is seriously challenged when some peers are autonomous, selfish, or malicious in large-scale, heterogeneous networks. In this paper, based on the latest advances in identitybased cryptography, we design a lightweight and cheat...

2014
Piers O'Hanlon Joss Wright Ian Brown Tulio de Souza

We present a lightweight key management protocol that provides secured device registration and communication in federated sensor networks. The protocol is designed for zero configuration and use in small packet low power wireless networks; protocol messages may fit into single packets. We use the Casper security protocol analyser to examine the behaviour and security properties of the protocol ...

2005
Ben Adida Susan Hohenberger Ronald L. Rivest

Email encryption techniques have been available for more than a decade, yet none has been widely deployed. The problems of key generation, certification, and distribution have not been pragmatically addressed. We recently proposed a method for implementing a Lightweight Public Key Infrastructure (PKI) for email authentication using recent developments in identitybased cryptography and today’s e...

Journal: :Groups Complexity Cryptology 2009
Alex D. Myasnikov Alexander Ushakov

The Anshel-Anshel-Goldfeld-Lemieux (abbreviated AAGL) key agreement protocol [1] is proposed to be used on low-cost platforms which constraint the use of computational resources. The core of the protocol is the concept of an Algebraic Eraser (abbreviated AE) which is claimed to be a suitable primitive for use within lightweight cryptography. The AE primitive is based on a new and ingenious idea...

2009
Keith M. Martin

The constraints of lightweight distributed computing environments such as wireless sensor networks lend themselves to the use of symmetric cryptography to provide security services. The lack of central infrastructure after deployment of such networks requires the necessary symmetric keys to be predistributed to participating nodes. The rich mathematical structure of combinatorial designs has re...

2003
Shai Halevi Phillip Rogaway

We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher intoa tweakable enciphering scheme that acts on strings of mn bits, where m ∈ [1..n]. The mode isparallelizable, but as serial-efficient as the non-parallelizable mode CMC [6]. EME can be usedto solve the disk-sector encryption problem. The algorithm entails two layers of ECB encryptionand a ...

2016
Derek Atkins

Historically “Lightweight Cryptography” has focused on symmetric schemes, yet asymmetric methods can also work effectively in these environments. Specifically, the Walnut Digital Signature Algorithm (WalnutDSA) provides a public-key signature scheme that verifies signatures significantly faster than ECC in both software and hardware, even in small, constrained environments and is resistant to a...

Journal: :IEEE Transactions on Nuclear Science 2023

Most safety-critical edge-computing devices rely on lightweight cryptography (LWC) algorithms to provide security at minimum power and performance overhead. LWC are traditionally embedded as a hardware component, but with the advance of Internet Things (IoT), emerging firmware is more likely support comply different levels industry-standards. This first work present soft error assessment five e...

Journal: :Applied sciences 2022

Personal data security is a cybersecurity trend that has captured the world’s attention. Governments, practitioners and academics are jointly building personal in various communication systems, including IoT. The protocol widely used IoT implementation MQTT. By default, MQTT does not provide features form of encryption. Therefore, this research was carried out on design Secure End-to-End Encryp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید