Results 1 to 10 of about 22,567 (276)

A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]

open access: yesSensors
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li   +4 more
doaj   +2 more sources

Elliptic Curve Lightweight Cryptography: A Survey

open access: yesIEEE Access, 2018
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino   +2 more
doaj   +3 more sources

Bibliometric Analysis of IoT Lightweight Cryptography

open access: yesInformation, 2023
In the rapidly developing world of the Internet of Things (IoT), data security has become increasingly important since massive personal data are collected.
Zenith Dewamuni   +3 more
doaj   +2 more sources

Lightweight Cryptography: Ciphers for RFID-systems

open access: yesБезопасность информационных технологий, 2011
In this paper the author introduces the conception of lightweight cryptography, new branch of cryptography, which considers ciphers, used in such resource-constraint devices like passive RFID-tags.
S. S. Agafyin
doaj   +1 more source

Proposal Framework to Light Weight Cryptography Primitives [PDF]

open access: yesEngineering and Technology Journal, 2022
Due to manufacturing cost and portability limitations, the computing power, storage capacity, and energy of the Internet of Things (IoT) hardware are still slowly developing.
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

Sustainable MapReduce: Optimizing Security and Efficiency in Hadoop Clusters with Lightweight Cryptography-based Key Management [PDF]

open access: yesE3S Web of Conferences, 2023
The exponential growth of big data has led to a significant increase in the volume and complexity of data being generated and stored. This trend has created a huge demand for secure storage and processing of big data.
Khadji Marwa   +3 more
doaj   +1 more source

Lightweight cryptography methods [PDF]

open access: yesJournal of Cyber Security Technology, 2017
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with embedded systems and sensor networks.
Buchanan, William J.   +2 more
openaire   +3 more sources

The Performance of Various Lightweight Block Ciphers FPGA Architectures: A Review

open access: yesAl-Iraqia Journal for Scientific Engineering Research, 2022
Today most of our devices connected with Internet to assistance us to improve our decisions. The number of people are using wireless and Internet networks increased day by day, which this increased improved the encryption mechanisms for devices and ...
Marwa Subhi Ibrahim   +2 more
doaj   +1 more source

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

open access: yesIEEE Access, 2021
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor   +2 more
doaj   +1 more source

Security of Neural Network-Based Key Agreement Protocol for Smart Grids

open access: yesEnergies, 2023
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms.
Miłosz Stypiński, Marcin Niemiec
doaj   +1 more source

Home - About - Disclaimer - Privacy