نتایج جستجو برای: lightweight cryptographic primitives

تعداد نتایج: 49629  

2012
Pouyan SEPEHRDAD

Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols. Having such blocks which provide provable security against various types of attacks is often hard. On the other hand, if possible, such designs are often too costly to be implemented and are usually ignored by practitioners. Moreover, in RFID protocols or sensor networks,...

Journal: :Electronics 2021

Fog computing as an extension to the cloud infrastructure has been invaluable in enhancing applicability of Internet Things (IoT) paradigm. IoT based systems magnify range and minimize latency applications. However, fog nodes are considered transient they offer authenticated services, when end device loses connectivity with a node, it must authenticate freshly secondary node. In this work, we p...

2001
Vitaly Shmatikov

We consider the so called “cryptographic protocols” whose aim is to ensure some security properties when communication channels are not reliable. Such protocols usually rely on cryptographic primitives. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the protocol itself may have weaknesses which can be exploited by an attacker. We sur...

2017
Lewis Nkenyereye Joonho Kwon Yoon-Ho Choi

In the vehicular networks, the real-time video reporting service is used to send the recorded videos in the vehicle to the cloud. However, when facilitating the real-time video reporting service in the vehicular networks, the usage of the fourth generation (4G) long term evolution (LTE) was proved to suffer from latency while the IEEE 802.11p standard does not offer sufficient scalability for a...

2016
Alex Biryukov Daniel Dinu Johann Großschädl

Side-Channel Analysis (SCA) represents a serious threat to the security of millions of smart devices that form part of the so-called Internet of Things (IoT). Choosing the “right” cryptographic primitive for the IoT is a highly challenging task due to the resource constraints of IoT devices and the variety of primitives. An important criterion to assess the suitability of a lightweight cipher w...

2016
Michael Höberl Ihtesham Haider Bernhard Rinner

Sensors have an essential role in the currently emerging Internet of Things (IoT) whereby these resource constrained nodes sense the environment, process the sensed data and forward it to a central entity. As some of this data might be sensitive in nature, it is crucial to ensure certain security guarantees on the sensed data such as integrity, confidentiality, and authenticity. Certain cryptog...

Journal: :IACR Trans. Symmetric Cryptol. 2017
Jérémy Jean Thomas Peyrin Siang Meng Sim

We study the synthesis of small functions used as building blocks in lightweight cryptographic designs in terms of hardware implementations. This phase most notably appears during the ASIC implementation of cryptographic primitives. The quality of this step directly affects the output circuit, and while general tools exist to carry out this task, most of them belong to proprietary software suit...

2010
Daniel W. Engels Xinxin Fan Guang Gong Honggang Hu Eric M. Smith

Due to the tight cost and constrained resources of highvolume consumer devices such as RFID tags, smart cards and wireless sensor nodes, it is desirable to employ lightweight and specialized cryptographic primitives for many security applications. Motivated by the design of the well-known Enigma machine, we present a novel ultralightweight cryptographic algorithm, referred to as Hummingbird, fo...

Journal: :IACR Cryptology ePrint Archive 2012
Josep Balasch Baris Ege Thomas Eisenbarth Benoît Gérard Zheng Gong Tim Güneysu Stefan Heyse Stéphanie Kerckhof François Koeune Thomas Plos Thomas Pöppelmann Francesco Regazzoni François-Xavier Standaert Gilles Van Assche Ronny Van Keer Loïc van Oldeneel tot Oldenzeel Ingo von Maurich

The pervasive diffusion of electronic devices in security and privacy sensitive applications has boosted research in cryptography. In this context, the study of lightweight algorithms has been a very active direction over the last years. In general, symmetric cryptographic primitives are good candidates for low-cost implementations. For example, several previous works have investigated the perf...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید