Results 21 to 30 of about 35,425 (325)

DRcipher: A pseudo-random dynamic round lightweight block cipher

open access: yesJournal of King Saud University: Computer and Information Sciences
The Internet of Things (IoT) has gained popularity in various fields, including components such as embedded devices and wireless sensors. However, ensuring the security of data transmission from these devices is of critical importance.
Juanli Kuang   +3 more
doaj   +2 more sources

DNA-PRESENT: An Improved Security and Low-Latency, Lightweight Cryptographic Solution for IoT [PDF]

open access: yesSensors
The vast interconnection of resource-constrained devices and the immense amount of data exchange in the Internet of Things (IoT) environment resulted in the resurgence of various security threats.
Maria Imdad   +5 more
doaj   +2 more sources

Survey of Lightweight Block Cipher [PDF]

open access: yesJisuanji kexue, 2023
With the rapid development of information technology,human beings are entering the era of ubiquitous connectivity,where billions of Internet of Things(IoT) devices are connected to the network.The continuous growth of network attacks targeting user ...
ZHONG Yue, GU Jieming, CAO Honglin
doaj   +1 more source

Proposal Framework to Light Weight Cryptography Primitives [PDF]

open access: yesEngineering and Technology Journal, 2022
Due to manufacturing cost and portability limitations, the computing power, storage capacity, and energy of the Internet of Things (IoT) hardware are still slowly developing.
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Software Implementation Solutions of A Lightweight Block Cipher to Secure Restricted IoT Environment: A Review [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2022
With the development of the Internet of Things (IoT) technology, IoT devices are integrated into many of our daily lives, including industrial, security, medical, and personal applications.
RUAH AL_AZZAWI, SUFYAN AL-DABBAGH
doaj   +1 more source

Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors

open access: yesMathematics, 2021
A crypto-ransomware has the process to encrypt victim’s files. Afterward, the crypto-ransomware requests a ransom for the password of encrypted files to victims.
Hyunji Kim   +4 more
doaj   +1 more source

Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU

open access: yesApplied Sciences, 2022
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of data are being created and communicated in IoT networks. Block ciphers are being used to protect these data from malicious attacks.
Hyunjun Kim    +4 more
doaj   +1 more source

GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes

open access: yesElectronics, 2023
The study of lightweight block ciphers has been a "hot topic". As one of the main structures of block ciphers, the Feistel structure has attracted much attention.
Xing Zhang   +4 more
semanticscholar   +1 more source

Construction of diffusion layers based on cipher structures

open access: yes网络与信息安全学报, 2017
Taked diffusion layers of block cipher algorithms as the research object,lightweight diffusion layers were constructed by two cipher structures based on the characteristics of diffusion layers of lightweight block cipher algorithms,which were the ...
Peng-fei LI
doaj   +3 more sources

Home - About - Disclaimer - Privacy