نتایج جستجو برای: nist lightweight cryptography competition

تعداد نتایج: 149027  

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2020

Journal: :Electronics 2022

Unmanned aerial vehicles (UAVs) (also known as drones) are aircraft that do not require the presence of a human pilot to fly. UAVs can be controlled remotely by operator or autonomously onboard computer systems. have many military uses, including battlefield surveillance, effective target tracking and engagement in air-to-ground warfare, situational awareness challenging circumstances. They als...

2011
Thomas Fuhr

This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We present various results, that belong to the fields of design and security analysis of hash functions. In the first part we introduce the field of hash functions. We describe how they are used in cryptography, and how to formalize security notions that guarantee their robustness in their various use ca...

2005
William Dupuy Sébastien Kunz-Jacques

Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms used, one of the most serious threats against secret data stored in such devices is Side Channel Analysis. Implementing Public Key Cryptography in low-profile devices such as smart cards is particularly challenging given ...

2015
Manfred Lochter Johannes Merkle Jörn-Marc Schmidt Torsten Schütze

Nowadays, cryptography based on the elliptic curve discrete logarithm problem is widely de­ ployed. This is due to its advantages compared to traditional asymmetric schemes relying on the hardness of factoring large numbers or of break­ ing the discrete logarithm problem in finite fields. The NIST curves provide a standard that is sup­ ported by most applications. Other curves like Brainpool an...

2004
Nils Gura Arun Patel Arvinderpal Wander Hans Eberle Sheueling Chang Shantz

Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement and implemented elliptic curve point multiplication for 160-bit, 192-bit, and 224-bit NIST/SECG curves over GF(p) and RSA-1024 and RSA-2048 on two 8-bit microcontrollers. To accelerate multiple-precision multiplication...

2010
Gaëtan Leurent

The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In this paper we study the security of Edon-R, and we show that using Edon-R as a MAC with the secretIV or secret-prefix construction is unsafe. We present a practical attack in the case of Edon-R256, which requires 32 queries, 2 comp...

2003
K. B. Fielhauer B. G. Boone

The National Aeronautics and Space Administration (NASA) plans to develop optical communication terminals for future spacecraft, especially in support of high data rate science missions and manned exploration of Mars. Future, very long-range missions, such as the Realistic Interstellar Explorer (RISE), will need optical downlink communications to enable even very low data rates. For all of thes...

Journal: :Applied sciences 2023

The emergence of quantum computers threatens current cryptographic systems, and NIST is preparing for the post-quantum era through cryptography (PQC) contest. CRYSTALS-Kyber a lattice-based cipher suite that used as PQC standard. Lattice-based considered quantum-safe computing because algorithm can more efficiently solve lattice problem compared to classic has not been reported yet. In this pap...

2009
Yan Wang Mohan Yang

SHA-3 Cryptographic Hash Algorithm Competition is a competition raised by NIST in response to recent advances of cryptanalysis, aiming at selecting new hash algorithm instead of SHA-2 like AES selection. The compression function of a hash function could be written in the form of multivariate boolean function. In this paper, we introduce our algorithms of evaluating boolean function and applied ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید