Results 41 to 50 of about 35,425 (325)
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources
Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the security of
A. Zakaria +4 more
semanticscholar +1 more source
Wave-Shaped Round Functions and Primitive Groups [PDF]
Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key ...
Aragona, Riccardo +4 more
core +2 more sources
SOFIA : software and control flow integrity architecture [PDF]
Microprocessors used in safety-critical systems are extremely sensitive to software vulnerabilities, as their failure can lead to injury, damage to equipment, or environmental catastrophe.
Coppens, Bart +8 more
core +1 more source
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
Best Effort and Practice Activation Codes [PDF]
Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent ...
Furnell, S. +4 more
core +4 more sources
A Survey on Lightweight Block Ciphers
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic algorithms for security. Lightweight cryptography is used for resource constrained devices (which have limited memory, limited power and less processing capability) such as radio frequency identification (RFID) tags, contactless smart cards, wireless ...
Prabhat Kumar +2 more
openaire +1 more source
Distinguishing Lightweight Block Ciphers in Encrypted Images
Modern day lightweight block ciphers provide powerful encryption methods for securing IoT communication data. Tiny digital devices exchange private data which the individual users might not be willing to get disclosed. On the other hand, the adversaries try their level best to capture this private data.
Rakshak Raina +4 more
openaire +2 more sources
The Simeck Family of Lightweight Block Ciphers [PDF]
Two lightweight block cipher families, Simon and Speck, have been proposed by researchers from the NSA recently. In this paper, we introduce Simeck, a new family of lightweight block ciphers that combines the good design components from both Simon and Speck, in order to devise even more compact and efficient block ciphers.
Gangqiang Yang +4 more
openaire +1 more source
Balancing Security and Efficiency: A Power Consumption Analysis of a Lightweight Block Cipher
This research paper presents a detailed analysis of a lightweight block cipher’s (LWBC) power consumption and security features, specifically designed for IoT applications.
Muhammad Rana, Q. Mamun, Rafiqul Islam
semanticscholar +1 more source

