Results 51 to 60 of about 35,425 (325)

Constructing cluster of simple FPGA boards for cryptologic computations [PDF]

open access: yes, 2012
In this paper, we propose an FPGA cluster infrastructure, which can be utilized in implementing cryptanalytic attacks and accelerating cryptographic operations.
Doroz, Yarkin   +3 more
core   +1 more source

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode

open access: yesIACR Transactions on Symmetric Cryptology, 2020
NIST has recently initiated a standardization project for efficient lightweight authenticated encryption schemes. SUNDAE, a candidate in this project, achieves optimal state size which results in low circuit overhead on top of the underlying block cipher.
Avik Chakraborti   +5 more
doaj   +1 more source

RAZOR A Lightweight Block Cipher for Security in IoT

open access: yesDefence Science Journal
Rapid technological developments prompted a need to do everything from anywhere and that is growing due to modern lifestyle. The Internet of Things (IoT) technology is helping to provide the solutions by inter-connecting the smart devices.
Dheeraj Singh, Manoj Kumar, T. Yadav
semanticscholar   +1 more source

A MAC Mode for Lightweight Block Ciphers [PDF]

open access: yes, 2016
Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by the fact that many new lightweight block cipher designs have block sizes as low as 64 or 32 bits.
Luykx, Atul   +3 more
openaire   +3 more sources

Enhancing Corrosion Resistance and Mechanical Strength of 3D‐Printed Iron Polylactic Acid for Marine Applications via Laser Surface Texturing

open access: yesAdvanced Engineering Materials, EarlyView.
Laser surface texturing significantly improves the corrosion resistance and mechanical strength of 3D‐printed iron polylactic acid (Ir‐PLA) for marine applications. Optimal laser parameters reduce corrosion by 80% and enhance tensile strength by 25% and ductility by 15%.
Mohammad Rezayat   +6 more
wiley   +1 more source

Systematization of a 256-bit lightweight block cipher Marvin [PDF]

open access: yes, 2018
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as ...
Bhattacharya, Abhishek   +2 more
core   +1 more source

Characterization of Defect Distribution in an Additively Manufactured AlSi10Mg as a Function of Processing Parameters and Correlations with Extreme Value Statistics

open access: yesAdvanced Engineering Materials, EarlyView.
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt   +8 more
wiley   +1 more source

Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis

open access: yesEntropy, 2023
Lightweight block ciphers are normally used in low-power resource-constrained environments, while providing reliable and sufficient security. Therefore, it is important to study the security and reliability of lightweight block ciphers.
Xing Fang   +4 more
doaj   +1 more source

An Enhanced Dataflow Analysis to Automatically Tailor Side Channel Attack Countermeasures to Software Block Ciphers [PDF]

open access: yes, 2017
Protecting software implementations of block ciphers from side channel attacks is a significant concern to realize secure embedded computation platforms.
Barenghi, Alessandro, Pelosi, Gerardo
core  

Home - About - Disclaimer - Privacy