Results 41 to 50 of about 8,786 (262)
Software Optimisation of Lightweight Klein Encryption in the Internet of Things
The Internet of Things (IoT) and Wireless Sensor Network (WSN) devices are prone to security vulnerabilities, especially when they are resource constrained.
Seyed Ramin Ghorashi +3 more
doaj +1 more source
DTLS Performance in Duty-Cycled Networks [PDF]
The Datagram Transport Layer Security (DTLS) protocol is the IETF standard for securing the Internet of Things. The Constrained Application Protocol, ZigBee IP, and Lightweight Machine-to-Machine (LWM2M) mandate its use for securing application traffic ...
Damon, Laurent +6 more
core +4 more sources
Quantum cryptanalysis of lightweight block cipher Piccolo
By taking the characteristics of the structure of Piccolo algorithm RP permutation into consideration, a 3-round quantum distinguisher was proposed.Based on Grover meets Simon algorithm, the 6-round of quantum key recovery attack was given.The results ...
Xiaoni DU +3 more
doaj +2 more sources
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S. +6 more
core +2 more sources
A fast and light stream cipher for smartphones [PDF]
We present a stream cipher based on a chaotic dynamical system. Using a chaotic trajectory sampled under certain rules in order to avoid any attempt to reconstruct the original one, we create a binary pseudo-random keystream that can only be exactly ...
Baptista, Murilo +2 more
core +1 more source
Constructing cluster of simple FPGA boards for cryptologic computations [PDF]
In this paper, we propose an FPGA cluster infrastructure, which can be utilized in implementing cryptanalytic attacks and accelerating cryptographic operations.
Doroz, Yarkin +3 more
core +1 more source
A Survey on Lightweight Block Ciphers
Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic algorithms for security. Lightweight cryptography is used for resource constrained devices (which have limited memory, limited power and less processing capability) such as radio frequency identification (RFID) tags, contactless smart cards, wireless ...
Prabhat Kumar +2 more
openaire +1 more source
Distinguishing Lightweight Block Ciphers in Encrypted Images
Modern day lightweight block ciphers provide powerful encryption methods for securing IoT communication data. Tiny digital devices exchange private data which the individual users might not be willing to get disclosed. On the other hand, the adversaries try their level best to capture this private data.
Rakshak Raina +4 more
openaire +2 more sources
The Simeck Family of Lightweight Block Ciphers [PDF]
Two lightweight block cipher families, Simon and Speck, have been proposed by researchers from the NSA recently. In this paper, we introduce Simeck, a new family of lightweight block ciphers that combines the good design components from both Simon and Speck, in order to devise even more compact and efficient block ciphers.
Gangqiang Yang +4 more
openaire +1 more source
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher.
Avik Chakraborti +5 more
doaj +1 more source

