نتایج جستجو برای: lightweight cryptographic primitives
تعداد نتایج: 49629 فیلتر نتایج به سال:
An increasing number of lightweight cryptographic primitives have been published in the last years. Some of these proposals only use additions, rotations and XORs, and these ARX primitives have shown a great performance in software. In this paper, a computer tool to automate the security evaluation of ARX block ciphers is shown. Our tool takes a Python implementation of an ARX block cipher and ...
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum cryptosystems are having important concerns in resource constraint wireless sensor based Mobile Ad Hoc Networks (MANETs). In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer ...
A symmetric or private-key cipher is one in which knowledge of the encryption key is explicitly or implicitly equivalent to knowing the decryption key. An asymmetric or public-key cipher is one in which the encryption key is effectively public knowledge, without giving any useful information about the decryption key. Until 30 years ago all ciphers were private-key. The very possibility of publi...
Recently, the security of existing symmetric cryptographic algorithms and protocols has been threatened by new performance challenges vulnerabilities. In this paper, we propose a dynamic key-dependent approach, ”TRESC”, to make ciphers more efficient robust. This can be done using substitution permutation primitives reduce number rounds while providing better resistance against cryptanalysis im...
Security is an important aspect of healthcare applications that employ Internet Things (IoT) technology. More specifically, providing privacy and ensuring the confidentiality, integrity authenticity IoT-based designs are crucial in health domain because collected data sensitive, continuous availability system critical for user’s wellbeing. However, IoT consists resource-constrained devices incr...
The security of resource-constrained devices is critical in the IoT field, given that everything interconnected. Therefore, National Institute Standards and Technology (NIST) initialized lightweight cryptography (LWC) project to standardize algorithms for devices. After two rounds, NIST announced finalists 2021. finalist are Ascon, Elephant, GIFT-COFB, Grain-128AEAD, ISAP, PHOTON-Beetle, Romulu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید