Results 11 to 20 of about 70 (69)

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

open access: yesIET Computers &Digital Techniques, Volume 17, Issue 3-4, Page 75-88, May-July 2023., 2023
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley   +1 more source

Experimental evaluation of differential fault attack on lightweight block cipher PIPO

open access: yesIET Information Security, Volume 17, Issue 1, Page 80-88, January 2023., 2023
Abstract The recent development of Internet of Things (IoT) devices has increased related security issues. Because of the rapid increase in the use of these devices, the possibility of accessing and hijacking cryptographic devices is increasing. Consequently, active research on cryptographic technologies capable of providing a safe environment even in ...
SeongHyuck Lim, Dong‐Guk Han
wiley   +1 more source

LLSFIoT: Lightweight Logical Security Framework for Internet of Things

open access: yesWireless Communications and Mobile Computing, Volume 2021, Issue 1, 2021., 2021
Current research in Internet of Things (IoT) is focused on the security enhancements to every communicated message in the network. Keeping this thought in mind, researcher in this work emphasizes on a security oriented cryptographic solution. Commonly used security cryptographic solutions are heavy in nature considering their key size, operations, and ...
Isha Batra   +7 more
wiley   +1 more source

Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM

open access: yesCryptography, 2019
In this work, we focus on LS-design ciphers Fantomas, Robin, and iSCREAM. LS-designs are a family of bitslice ciphers aimed at efficient masked implementations against side-channel analysis.
Ashutosh Dhar Dwivedi   +3 more
doaj   +1 more source

Enabling secure data transmission for wireless sensor networks based IoT applications

open access: yesAin Shams Engineering Journal, 2023
The high volume of sensed and transferred data among nodes on wireless sensor networks makes it necessary to keep the data safe. This study offers an improved security mechanism, taking the application, security level, and bit error rate into account for
Uras Panahi, Cüneyt Bayılmış
doaj   +1 more source

Aplicación de protocolos de control de calidad en equipos de fluoroscopia en las ciudades de Tunja (Boyacá) y Bogotá

open access: yesRevista Investigaciones y Aplicaciones Nucleares, 2019
La obtención de imágenes de calidad en fluoroscopia depende, entre otros factores, de la habilidad del tecnólogo, del procedimiento radiográfico y, en especial, del desempeño del equipo utilizado.
Mercy Natalia González Sánchez   +1 more
doaj   +1 more source

Eficacia antirradiación de la máscara facial en cardiología intervencionista: un estudio con fantomas

open access: yesRevista Chilena de Radiología, 2023
Antecedentes: La eficacia de las máscaras faciales plomo-acrílicas atenuadoras de radiación utilizadas en cardiología intervencionista ha sido poco estudiada.
Alejandro Prieto-López   +4 more
doaj   +1 more source

Le Bleu et le noir. Fantômas, le temps des guerres chromatiques (1962-1969)

open access: yesBelphégor, 2013
La trilogie cinématographique des Fantomas (1964, 1965, 1967) dirigés par André Hunebelle est la seule des adaptations du « Génie du crime » à connaître encore, par la télévision, le succès populaire.À partir d’archives inédites, cette étude documente l ...
Loïc Artiaga
doaj   +1 more source

Fantomas urbanos: cuerpos vigilados calles retratadas

open access: yesAisthesis, 2012
Las primeras fotografías de ciudad tomadas en Chile, inicialmente por viajeros extranjeros, pueden ser leídas como el diseño espacial de una estrategia de ordenamiento sociopolítico.
Lorena Antezana Barrios   +1 more
doaj   +1 more source

Fantômas ou le mythe de « l’homme moderne » chez les poètes des années 1910 et 1920

open access: yesBelphégor, 2013
À partir d’un choix de textes d’Apollinaire, de Max Jacob, de Cendrars, d’Aragon et de Robert Desnos, cet article explique l’importance conférée au personnage de Fantômas par le fait qu’il incarne pour cette génération « l’homme moderne », dandy d’un ...
Nadja Cohen
doaj   +1 more source

Home - About - Disclaimer - Privacy