Results 11 to 20 of about 22,603 (282)
Matrix Encryption Walks for Lightweight Cryptography
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW).
Aeryn Dunmore +2 more
doaj +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh +2 more
doaj +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang +5 more
doaj +1 more source
Elliptic Curve Lightweight Cryptography: A Survey
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in industry and academy from different perspectives. Some of these aspects include mathematical foundations, protocol design, curve generation, security proofs ...
Carlos Andres Lara-Nino +2 more
doaj +1 more source
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs
Lightweight cryptography ensures cryptography applications to devices with limited resources. Low-area implementations of linear layers usually play an essential role in lightweight cryptography.
Qun Liu +5 more
doaj +1 more source
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor ...
Mohammed El-hajj +2 more
doaj +1 more source
Hardware Implementation of the GPS authentication [PDF]
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël +2 more
core +4 more sources
End-to-End Encryption in Resource-Constrained IoT Device
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj +1 more source
The article discusses the concept of «financial cryptography», which appeared in 1997 in the eponymous conference title and used abroad to date along with concepts of «quantum cryptography», «post-quantumcryptography», «lightweight cryptography» and ...
Alexander A. Varfolomeev
doaj +1 more source
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +6 more sources

