نتایج جستجو برای: nist lightweight cryptography competition

تعداد نتایج: 149027  

2012
Jens-Peter Kaps Panasayya Yalla Kishore Kumar Surapathi Bilal Habib Susheel Vadlamudi Smriti Gurung

The NIST competition for developing the new cryptographic hash algorithm SHA-3 has entered its third round. One evaluation criterion is the ability of the candidate algorithm to be implemented on resource-constrained platforms. This includes FPGAs for embedded and hand-held devices. In this paper we present two sets of lightweight implementations of all SHA-3 finalists and SHA-2, one using only...

2015
Abdulkarim Amer Alireza Jolfaei

In today’s world most of the communication is done using electronic media. Data Security plays a vital role in such communication. Hence, there is a need to protect data from malicious attacks. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and ...

2010
Joppe W. Bos Deian Stefan

The NIST hash function competition to design a new cryptographic hash standard ‘SHA-3’ is currently one of the hot topics in cryptologic research, its outcome heavily depends on the public evaluation of the remaining 14 candidates. There have been several cryptanalytic efforts to evaluate the security of these hash functions. Concurrently, invaluable benchmarking efforts have been made to measu...

Journal: :IEEE Transactions on Computers 2022

Lattice-based cryptography, as an active branch of post-quantum cryptography (PQC), has drawn great attention from side-channel analysis researchers in recent years. Despite the various targets examined previous studies, detail on revealing secret-dependent information efficiently is less studied. In this paper, we propose adaptive EM attacks with carefully constructed ciphertexts Kyber, which ...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2021

BIKE is a key encapsulation mechanism that entered the third round of NIST post-quantum cryptography standardization process. This paper presents two constant-time implementations for BIKE, one tailored Intel Haswell and ARM Cortex-M4. Our implementation much faster than avx2 written by team: bikel1, level-1 parameter set, we achieve 1.39x speedup decapsulation (which slowest operation) 1.33x s...

Journal: :Eurasip Journal on Wireless Communications and Networking 2021

Abstract In order to solve the problem between low power of Internet Things devices and high cost cryptography, lightweight cryptography is required. The improvement scalar multiplication can effectively reduce complexity elliptic curve (ECC). this paper, we propose a fast formula for point septupling on curves over binary fields using division polynomial multiplexing intermediate values accele...

2010
Diego F. Aranha Julio López Hernandez Darrel Hankerson

In this paper we describe an efficient software implementation of characteristic 2 fields making extensive use of vector instruction sets commonly found in desktop processors. Field elements are represented in a split form so performance-critical field operations can be formulated in terms of simple operations over 4-bit sets. In particular, we detail techniques for implementing field multiplic...

Journal: :Fluctuation and Noise Letters 2023

Generating streams of true random numbers is a critical component many electronic and information systems. The design fully integrated, area power efficient number generators (TRNGs) challenge. We propose lightweight implementation that uses the telegraph noise (RTN) standard MOSFET as entropy source. It not analog-intensive, without traditional post-processing algorithms, generated bit sequenc...

Journal: :Electronics 2023

Lightweight cryptography is implemented in unrolled architecture generally, which has the characteristics of low latency and high real-time performance but also faces threat Side-Channel Attack (SCA). Different from traditional loop architecture, requires separate protection against SCA each round. This leads to that very sensitive number rounds need be protected SCA. In this paper, we propose ...

2013
Ying Li Ping Du

In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید