نتایج جستجو برای: nist lightweight cryptography competition

تعداد نتایج: 149027  

Journal: :IACR Cryptology ePrint Archive 2010
Thomaz Oliveira Julio López Hernandez

Luffa is a new hash algorithm that has been accepted for round two of the NIST hash function competition SHA-3. Computational efficiency is the second most important evaluation criteria used to compare candidate algorithms. In this paper, we describe a fast software implementation of the Luffa hash algorithm for the Intel Core 2 Duo platform. We explore the use of the perfect shuffle operation ...

Journal: :ACM Transactions in Embedded Computing Systems 2022

Polynomial multiplication algorithms such as Toom-Cook and the Number Theoretic Transform are fundamental building blocks for lattice-based post-quantum cryptography. In this work we present correlation power analysis based side-channel methodologies targeting every polynomial strategy all key encapsulation mechanisms in final round of NIST standardization procedure. We perform practical experi...

1991
James Nechvatal

PREFACE This publication presents a state-of-the-art survey of public-key cryptography circa 1988-1990. In doing so, it covers a number of different topics including: 1. The theory of public-key cryptography. 2. Comparisons to conventional (secret-key) cryptography. 3. A largely self-contained summary of relevant mathematics. 4. A survey of major existing public-key systems. 5. An exploration o...

2005
Erik-Oliver Blaß Martina Zitterbart

One of the huge problems for security in sensor networks is the lack of resources. Typical sensor nodes such as the quite popular MICA and MICA2 Motes from UC Berkeley [1] are based on a microcontroller architecture with only a few KBytes of memory and severe limited computing ability. Strong publickey cryptography is therefore commonly seen as infeasible on such devices. In contrast to this pr...

2016

Many smart card, cell phone, Internet of Things (IoT) and Bitcoin businesses have already implemented elliptic curve cryptography (ECC), and for good reason. This asymmetric encryption and decryption method is shown by the US National Institute of Standards and Technology (NIST) and third-party studies to significantly outperform its biggest competitors, offering significantly shorter keys, low...

2007
D. Fu J. Solinas

This document describes new Elliptic Curve Cryptography (ECC) groups for use in the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols in addition to previously defined groups. Specifically, the new curve groups are based on modular arithmetic rather than binary arithmetic. These new groups are defined to align IKE and IKEv2 with other ECC implementations and stan...

2005
Erik-Oliver Blass Martina Zitterbart

One of the huge problems for security in sensor networks is the lack of resources. Based on microcontroller architectures with severe limited computing abilities, strong public-key cryptography is commonly seen as infeasible on sensor devices. In contrast to this prejudice this paper presents an efficient and lightweight implementation of public-key cryptography algorithms relying on elliptic c...

Journal: :ACM Transactions in Embedded Computing Systems 2023

Rainbow Signature Scheme is one of the finalists in National Institute Standards and Technology (NIST) Post-Quantum Cryptography (PQC) standardization competition, but failed to win because it has lack stability parameter selection. It only signature candidate based on a multivariate quadratic equation. signatures have smaller sizes compared other post-quantum cryptography candidates. However, ...

2012
Mustafa Çoban Ferhat Karakoç Özkan Boztas

TWINE is a lightweight block cipher proposed at ECRYPT Workshop on Lightweight Cryptography 2011, Belgium. The cipher consists of 36 rounds and has two versions TWINE-80 and TWINE-128 supporting key lengths of 80 and 128 bits, respectively. The block length of the two versions is 64-bit. In this paper, we present the first single-key attacks on the both versions of the cipher. In these attacks,...

2013
Ankur Divyanjali

R andom numbers are important in every aspect of cryptography. We are evaluating the basic principles which are essential in the design of uniform random number generators, their most important quality requirements, their theoretical study, and their practical testing. National Institute of Standards and Technology (NIST) statistical test suite is the best test suite provided to test the accura...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید