Results 41 to 50 of about 8,786 (262)

Software Optimisation of Lightweight Klein Encryption in the Internet of Things

open access: yesJournal of Information Security and Cybercrimes Research, 2021
The Internet of Things (IoT) and Wireless Sensor Network (WSN) devices are prone to security vulnerabilities, especially when they are resource constrained.
Seyed Ramin Ghorashi   +3 more
doaj   +1 more source

DTLS Performance in Duty-Cycled Networks [PDF]

open access: yes, 2015
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent   +6 more
core   +4 more sources

Quantum cryptanalysis of lightweight block cipher Piccolo

open access: yesTongxin xuebao, 2023
By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results ...
Xiaoni DU   +3 more
doaj   +2 more sources

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]

open access: yes, 2020
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S.   +6 more
core   +2 more sources

A fast and light stream cipher for smartphones [PDF]

open access: yes, 2013
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo   +2 more
core   +1 more source

Constructing cluster of simple FPGA boards for cryptologic computations [PDF]

open access: yes, 2012
In this paper, we propose an FPGA cluster infrastructure, which can be utilized in implementing cryptanalytic attacks and accelerating cryptographic operations.
Doroz, Yarkin   +3 more
core   +1 more source

A Survey on Lightweight Block Ciphers

open access: yesInternational Journal of Computer Applications, 2014
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic algorithms for security. Lightweight cryptography is used for resource constrained devices (which have limited memory, limited power and less processing capability) such as radio frequency identification (RFID) tags, contactless smart cards, wireless ...
Prabhat Kumar   +2 more
openaire   +1 more source

Distinguishing Lightweight Block Ciphers in Encrypted Images

open access: yesDefence Science Journal, 2021
Modern day lightweight block ciphers provide powerful encryption methods for securing IoT communication data. Tiny digital devices exchange private data which the individual users might not be willing to get disclosed. On the other hand, the adversaries try their level best to capture this private data.
Rakshak Raina   +4 more
openaire   +2 more sources

The Simeck Family of Lightweight Block Ciphers [PDF]

open access: yes, 2015
Two lightweight block cipher families, Simon and Speck, have been proposed by researchers from the NSA recently. In this paper, we introduce Simeck, a new family of lightweight block ciphers that combines the good design components from both Simon and Speck, in order to devise even more compact and efficient block ciphers.
Gangqiang Yang   +4 more
openaire   +1 more source

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

open access: yesIACR Transactions on Symmetric Cryptology, 2020
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher.
Avik Chakraborti   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy