نتایج جستجو برای: nist lightweight cryptography competition
تعداد نتایج: 149027 فیلتر نتایج به سال:
This paper shows the great potential of lightweight cryptography in fast and timing-attack resistant software implementations in cloud computing by exploiting bitslice implementation. This is demonstrated by bitslice implementations of the PRESENT and Piccolo lightweight block ciphers. In particular, bitsliced PRESENT-80/128 achieves 4.73 cycles/byte and Piccolo-80 achieves 4.57 cycles/byte inc...
Providing security in low-cost RFID tags is a challenging task because tags are highly resource constrained and cannot support strong cryptography. Special lightweight algorithms and protocols need to be designed that take into account the limitations of the tags. In this paper, we propose a set of extremely lightweight tag authentication protocols. We also provide an analysis of the proposed p...
Increasingly, everyday items are enhanced to pervasive devices by embedding computing power and their interconnection leads to Mark Weiser’s famous vision of ubiquitous computing (ubicomp), which is widely believed to be the next paradigm in information technology. The mass deployment of pervasive devices promises on the one hand many benefits (e.g. optimized supply-chains), but on the other ha...
Transition has entailed the introduction of policies to stimulate product market competition, to establish effective corporate governance and to harden enterprise budget constraints. How do these policies interact? Are they substitute policy instruments or does one policy reinforce the effect of another? Although early endogenous growth models predicted a negative relationship between competiti...
Several empirical studies have found a negative relationship between corruption and the decentralization of the powers to tax and spend. In this paper we explain this phenomenon using a model of Yardstick Competition. Using data on federal corruption-related convictions in U.S. states, we also provide new evidence that points to the existence of a spatial autoregressive component to explaining ...
This paper presents an examination of the different FPGA architectures used to implement the various hash function candidates for the currently ongoing NIST-organised SHA-3 competition [1]. This paper is meant to be used as both a quick reference guide used in conjunction with the results table [2] as an aid in finding the best-fit FPGA for a particular algorithm, as well as a helpful guide for...
Secure communication is important for Internet of Things (IoT) applications, to avoid cybersecurity attacks. One the key security aspects data integrity, which can be protected by employing cryptographic hash functions. Recently, US National Institute Standards and Technology (NIST) announced a competition standardize lightweight functions, used in IoT applications. involves various hardware pl...
$$\mathsf {Gimli}$$ is a family of cryptographic primitives (both hash function and an AEAD scheme) that has been selected for the second round NIST competition standardizing new lightweight designs. The candidate based on permutation , which was presented at CHES 2017. In this paper, we study security both constructions are it. We exploit slow diffusion in its internal symmetries to build, fir...
Cryptographic primitives are required to protect an IT (Information Technology) system. They are used to provide CIA (Confidentiality, Integrity, and Availability) and other security attributes to the system. So far, NIST (National Institute of Standard and Technology) has successfully standardized AES (Advanced Encryption Standard) for confidentiality and SHA (Secure Hash Algorithm) for integr...
The National Institute of Standards and Technology (NIST) opened a public competition on November 2, 2007 to develop a new cryptographic hash algorithm – SHA-3, which will augment the hash algorithms currently specified in the Federal Information Processing Standard (FIPS) 180-3, Secure Hash Standard. The competition was NIST’s response to advances in the cryptanalysis of hash algorithms. NIST ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید