نتایج جستجو برای: nist lightweight cryptography competition

تعداد نتایج: 149027  

2014
Hadi Soleimany

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Hadi Soleimany Name of the doctoral dissertation Studies in Lightweight Cryptography Publisher School of Science Unit Department of Information and Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 211/2014 Field of research Theoretical Computer Science Manuscript submitted 26 September 2014 Da...

Journal: :IACR Cryptology ePrint Archive 2016
Khushboo Bussi Dhananjoy Dey Manoj Kumar Biswas B. K. Dass

RFID technology is one of the major applications of lightweight cryptography where security and cost both are equally essential or we may say that cost friendly cryptographic tools have given more weightage. In this paper, we propose a lightweight hash, Neeva-hash satisfying the very basic idea of lightweight cryptography. Neeva-hash is based on sponge mode of iteration with software friendly p...

2009
Tameem Eissa SHUKOR ABD RAZAK

Mobile Ad Hoc Network (MANET) is a wireless networking technology with high mobility and continuous changing of nodes number. The prevention mechanisms of authentication are the first line of defense against the malicious attacks. However, using the traditional authentication schemes is not suitable for the limited resources environments. This research is going to develop a new lightweight auth...

Journal: :Cryptography and Communications 2023

Abstract This survey presents the rich history of Welch-Gong (WG) Stream cipher family. It has been a long journey that lead WG stream ciphers to become practical. The evolutionary path is combination mathematical endeavour and engineering striving transfer pure functions practical encryption algorithms for various applications. began as pioneering work on transformation sequences with 2-level ...

2008
Christophe Petit Kristin Lauter Jean-Jacques Quisquater

Hash functions are widely used in cryptography. Recent breakthroughs against the standard SHA-1 prompted NIST to launch a competition for a new secure hash algorithm, SHA-3 [1]. Provably secure hash functions, that is functions whose security reduces to a simply-stated, supposedly hard mathematical problem, are widely believed to be much too slow for the NIST competition. In this paper, we disc...

Journal: :Journal of Low Power Electronics 2017

Journal: :CoRR 2017
Jaber Hosseinzadeh Abbas Ghaemi Bafghi

The conventional cryptography solutions are ill-suited to strict memory, size and power limitations of resourceconstrained devices, so lightweight cryptography solutions have been specifically developed for this type of applications. In this domain of cryptography, the term lightweight never refers to inadequately low security, but rather to establishing the best balance to maintain sufficient ...

Journal: :International journal of Computer Networks & Communications 2018

Journal: :Annales UMCS, Informatica 2012
Tomasz Bilski Krzysztof Bucholc Anna Grocholewska-Czurylo Janusz Stoklosa

Hash functions are used to generate a short form of an original message of any size. This short form is called a hash of a message or a message digest and is used in many cryptographic applications including message integrity verification and message authentication, in which case a keyed hash function is used. Hash function h operates on a message m of an arbitrary length. The result is a hash ...

Journal: :International journal of advanced technology and engineering exploration 2022

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید