Results 11 to 20 of about 23,485 (319)

Proposal Framework to Light Weight Cryptography Primitives [PDF]

open access: yesEngineering and Technology Journal, 2022
Due to manufacturing cost and portability limitations, the computing power, storage capacity, and energy of the Internet of Things (IoT) hardware are still slowly developing.
Mustafa Abd Zaid, Soukaena Hassan
doaj   +1 more source

Sustainable MapReduce: Optimizing Security and Efficiency in Hadoop Clusters with Lightweight Cryptography-based Key Management [PDF]

open access: yesE3S Web of Conferences, 2023
The exponential growth of big data has led to a significant increase in the volume and complexity of data being generated and stored. This trend has created a huge demand for secure storage and processing of big data.
Khadji Marwa   +3 more
doaj   +1 more source

Lightweight cryptography methods [PDF]

open access: yesJournal of Cyber Security Technology, 2017
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processing power and memory capabilities, these do not scale well into a world with embedded systems and sensor networks.
Buchanan, William J.   +2 more
openaire   +3 more sources

The Performance of Various Lightweight Block Ciphers FPGA Architectures: A Review

open access: yesAl-Iraqia Journal for Scientific Engineering Research, 2022
Today most of our devices connected with Internet to assistance us to improve our decisions. The number of people are using wireless and Internet networks increased day by day, which this increased improved the encryption mechanisms for devices and ...
Marwa Subhi Ibrahim   +2 more
doaj   +1 more source

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

open access: yesIEEE Access, 2021
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.
Vishal A. Thakor   +2 more
doaj   +1 more source

Security of Neural Network-Based Key Agreement Protocol for Smart Grids

open access: yesEnergies, 2023
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms.
Miłosz Stypiński, Marcin Niemiec
doaj   +1 more source

Matrix Encryption Walks for Lightweight Cryptography

open access: yesCryptography, 2023
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW).
Aeryn Dunmore   +2 more
doaj   +1 more source

Patterned Cipher Block for Low-Latency Secure Communication

open access: yesIEEE Access, 2020
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh   +2 more
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Lightweight cryptography ensures cryptography applications to devices with limited resources. Low-area implementations of linear layers usually play an essential role in lightweight cryptography.
Qun Liu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy