نتایج جستجو برای: lightweight cryptographic primitives

تعداد نتایج: 49629  

Journal: :Acta Applicandae Mathematicae 2006

2017
Adrián Ranea Yunwen Liu Tomer Ashur

An increasing number of lightweight cryptographic primitives have been published in the last years. Some of these proposals only use additions, rotations and XORs, and these ARX primitives have shown a great performance in software. In this paper, a computer tool to automate the security evaluation of ARX block ciphers is shown. Our tool takes a Python implementation of an ARX block cipher and ...

Journal: :I. J. Network Security 2016
Adarsh Kumar Krishna Gopal Alok Aggarwal

Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer ...

2007
El Gamal

A symmetric or private-key cipher is one in which knowledge of the encryption key is explicitly or implicitly equivalent to knowing the decryption key. An asymmetric or public-key cipher is one in which the encryption key is effectively public knowledge, without giving any useful information about the decryption key. Until 30 years ago all ciphers were private-key. The very possibility of publi...

Journal: :Microprocessors and Microsystems 2021

Recently, the security of existing symmetric cryptographic algorithms and protocols has been threatened by new performance challenges vulnerabilities. In this paper, we propose a dynamic key-dependent approach, ”TRESC”, to make ciphers more efficient robust. This can be done using substitution permutation primitives reduce number rounds while providing better resistance against cryptanalysis im...

Journal: :Cryptography 2022

Security is an important aspect of healthcare applications that employ Internet Things (IoT) technology. More specifically, providing privacy and ensuring the confidentiality, integrity authenticity IoT-based designs are crucial in health domain because collected data sensitive, continuous availability system critical for user’s wellbeing. However, IoT consists resource-constrained devices incr...

Journal: :Electronics 2022

The security of resource-constrained devices is critical in the IoT field, given that everything interconnected. Therefore, National Institute Standards and Technology (NIST) initialized lightweight cryptography (LWC) project to standardize algorithms for devices. After two rounds, NIST announced finalists 2021. finalist are Ascon, Elephant, GIFT-COFB, Grain-128AEAD, ISAP, PHOTON-Beetle, Romulu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید