Results 251 to 260 of about 35,425 (325)
Some of the next articles are maybe not open access.
J. Electronic Imaging, 2023
. Internet of Things (IoT) connects a wide range of small devices over a large network, allowing for a wide range of applications. With the advancement of open-source public networks (such as IoT), image transmission for resource-constrained devices is ...
Pulkit Singh +3 more
semanticscholar +1 more source
. Internet of Things (IoT) connects a wide range of small devices over a large network, allowing for a wide range of applications. With the advancement of open-source public networks (such as IoT), image transmission for resource-constrained devices is ...
Pulkit Singh +3 more
semanticscholar +1 more source
Lightweight block cipher on VHDL
2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2017Internet of Things (IoT) will change how we interact with our physical world. It will enable total sensing and controlling of most of the things around us. However, the practical acceptance of IoT from the market determine by the level of confidence perceived by the user.
Mohd Saufy Rohmad +4 more
openaire +1 more source
Attention in Differential Cryptanalysis on Lightweight Block Cipher SPECK
Conference on Privacy, Security and Trust, 2023The research on combining cryptanalysis with deep learning has recently attracted increasing attention. As an ultra-lightweight cipher for IoT environments, SPECK has attracted much attention from researchers for its excellent performance, and there have
Haoran Deng, Xianghui Cao, Yu Cheng
semanticscholar +1 more source
A Review on Lightweight Block Ciphers
SSRN Electronic Journal, 2020Lightweight cryptography has been very important for the last few years. It became one the most important block of a secure embedded systems because it has been a strong requirement for any resource constrained devices, and has several features like, it consumes only less power, less memory, etc.
Shilpa K, Chinchu A
openaire +1 more source
SFN: A new lightweight block cipher
Microprocessors and Microsystems, 2018Abstract During past few years, some lightweight block ciphers have been proposed. These lightweight block ciphers take single encryption method that either uses Substitution-Permutation (SP) network structure or Feistel network structure to encrypt.
Lang Li, Botao Liu, Yimeng Zhou, Yi Zou
openaire +1 more source
µ2 : A Lightweight Block Cipher
2020This paper presents a 64-bit lightweight block cipher, µ2 with a key size of 80-bit. µ2 is designed based on well-established design paradigms, achieving comparable performance and security when compared against existing state-of-the-art lightweight block ciphers. µ2 is based on the Type-II generalized Feistel structure with a round function, F that is
Wei-Zhu Yeoh +2 more
openaire +1 more source
Improved algebraic attacks on lightweight block ciphers
Journal of Cryptographic Engineering, 2020This paper proposes improved algebraic attacks that are effective for lightweight block ciphers. Concretely, we propose a new framework that leverages on algebraic preprocessing as well as modern SAT solvers to perform algebraic cryptanalysis on block ciphers.
Sze Ling Yeo +2 more
openaire +1 more source
An Extended Type-1 Generalized Feistel Networks: Lightweight Block Cipher for IoT
IEEE Internet of Things Journal, 2022In the last few years, a large amount of private and sensitive data generated by Internet of Things (IoT) devices need to be transmitted, stored, and processed in security, which become a serve challenge because these resource-constrained IoT devices ...
Junhua Cheng, Songtao Guo, Jing He
semanticscholar +1 more source
New Differential Cryptanalysis Results for the Lightweight Block Cipher BORON
IACR Cryptology ePrint Archive, 2022BORON is a 64-bit lightweight block cipher based on the substitution-permutation network that supports an 80-bit (BORON-80) and 128-bit (BORON-128) secret key.
J. Teh, L. J. Tham, N. Jamil, W. Yap
semanticscholar +1 more source
A review of lightweight block ciphers
Journal of Cryptographic Engineering, 2017Embedded systems are deployed in various domains, including industrial installations, critical and nomadic environments, private spaces and public infrastructures. Their operation typically involves access, storage and communication of sensitive and/or critical information that requires protection, making the security of their resources and services an
George Hatzivasilis +3 more
openaire +1 more source

