نتایج جستجو برای: nist lightweight cryptography competition
تعداد نتایج: 149027 فیلتر نتایج به سال:
The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third round. One evaluation criterion is the ability of the candidate algorithm to be implemented on resource-constrained platforms. This includes FPGAs for embedded and hand-held devices. In this paper we present two sets of lightweight implementations of all SHA-3 finalists and SHA-2, one using only...
In today’s world most of the communication is done using electronic media. Data Security plays a vital role in such communication. Hence, there is a need to protect data from malicious attacks. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and ...
The NIST hash function competition to design a new cryptographic hash standard ‘SHA-3’ is currently one of the hot topics in cryptologic research, its outcome heavily depends on the public evaluation of the remaining 14 candidates. There have been several cryptanalytic efforts to evaluate the security of these hash functions. Concurrently, invaluable benchmarking efforts have been made to measu...
Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great attention from side-channel analysis researchers in recent years. Despite the various targets examined previous studies, detail on revealing secret-dependent information efficiently is less studied. In this paper, we propose adaptive EM attacks with carefully constructed ciphertexts Kyber, which ...
BIKE is a key encapsulation mechanism that entered the third round of NIST post-quantum cryptography standardization process. This paper presents two constant-time implementations for BIKE, one tailored Intel Haswell and ARM Cortex-M4. Our implementation much faster than avx2 written by team: bikel1, level-1 parameter set, we achieve 1.39x speedup decapsulation (which slowest operation) 1.33x s...
Abstract In order to solve the problem between low power of Internet Things devices and high cost cryptography, lightweight cryptography is required. The improvement scalar multiplication can effectively reduce complexity elliptic curve (ECC). this paper, we propose a fast formula for point septupling on curves over binary fields using division polynomial multiplexing intermediate values accele...
In this paper we describe an efficient software implementation of characteristic 2 fields making extensive use of vector instruction sets commonly found in desktop processors. Field elements are represented in a split form so performance-critical field operations can be formulated in terms of simple operations over 4-bit sets. In particular, we detail techniques for implementing field multiplic...
Generating streams of true random numbers is a critical component many electronic and information systems. The design fully integrated, area power efficient number generators (TRNGs) challenge. We propose lightweight implementation that uses the telegraph noise (RTN) standard MOSFET as entropy source. It not analog-intensive, without traditional post-processing algorithms, generated bit sequenc...
Lightweight cryptography is implemented in unrolled architecture generally, which has the characteristics of low latency and high real-time performance but also faces threat Side-Channel Attack (SCA). Different from traditional loop architecture, requires separate protection against SCA each round. This leads to that very sensitive number rounds need be protected SCA. In this paper, we propose ...
In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید