Results 11 to 20 of about 23,485 (319)
Proposal Framework to Light Weight Cryptography Primitives [PDF]
Due to manufacturing cost and portability limitations, the computing power, storage capacity, and energy of the Internet of Things (IoT) hardware are still slowly developing.
Mustafa Abd Zaid, Soukaena Hassan
doaj +1 more source
Sustainable MapReduce: Optimizing Security and Efficiency in Hadoop Clusters with Lightweight Cryptography-based Key Management [PDF]
The exponential growth of big data has led to a significant increase in the volume and complexity of data being generated and stored. This trend has created a huge demand for secure storage and processing of big data.
Khadji Marwa +3 more
doaj +1 more source
Lightweight cryptography methods [PDF]
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with embedded systems and sensor networks.
Buchanan, William J. +2 more
openaire +3 more sources
The Performance of Various Lightweight Block Ciphers FPGA Architectures: A Review
Today most of our devices connected with Internet to assistance us to improve our decisions. The number of people are using wireless and Internet networks increased day by day, which this increased improved the encryption mechanisms for devices and ...
Marwa Subhi Ibrahim +2 more
doaj +1 more source
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor +2 more
doaj +1 more source
Security of Neural Network-Based Key Agreement Protocol for Smart Grids
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms.
Miłosz Stypiński, Marcin Niemiec
doaj +1 more source
Matrix Encryption Walks for Lightweight Cryptography
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW).
Aeryn Dunmore +2 more
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh +2 more
doaj +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs
Lightweight cryptography ensures cryptography applications to devices with limited resources. Low-area implementations of linear layers usually play an essential role in lightweight cryptography.
Qun Liu +5 more
doaj +1 more source

