Results 11 to 20 of about 22,603 (282)

Matrix Encryption Walks for Lightweight Cryptography

open access: yesCryptography, 2023
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW).
Aeryn Dunmore   +2 more
doaj   +1 more source

Patterned Cipher Block for Low-Latency Secure Communication

open access: yesIEEE Access, 2020
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh   +2 more
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Elliptic Curve Lightweight Cryptography: A Survey

open access: yesIEEE Access, 2018
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino   +2 more
doaj   +1 more source

More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Lightweight cryptography ensures cryptography applications to devices with limited resources. Low-area implementations of linear layers usually play an essential role in lightweight cryptography.
Qun Liu   +5 more
doaj   +1 more source

Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform

open access: yesFuture Internet, 2023
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor ...
Mohammed El-hajj   +2 more
doaj   +1 more source

Hardware Implementation of the GPS authentication [PDF]

open access: yes, 2012
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël   +2 more
core   +4 more sources

End-to-End Encryption in Resource-Constrained IoT Device

open access: yesIEEE Access, 2023
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj   +1 more source

ANALYSIS OF THE CHANGE OF THE CONCEPT «FINANCIAL CRYPTOGRAPHY» ON THE BASIS OF 20 YEARS SUBJECTS OF THE INTERNATIONAL CONFERENCE «FINANCIAL CRYPTOGRAPHY AND DATA SECURITY»

open access: yesСтатистика и экономика, 2016
The article discusses the concept of «financial cryptography», which appeared in 1997 in the eponymous conference title and used abroad to date along with concepts of «quantum cryptography», «post-quantumcryptography», «lightweight cryptography» and ...
Alexander A. Varfolomeev
doaj   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

Home - About - Disclaimer - Privacy