Results 11 to 20 of about 22,667 (173)

Matrix Encryption Walks for Lightweight Cryptography

open access: yesCryptography, 2023
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW).
Aeryn Dunmore   +2 more
doaj   +1 more source

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]

open access: yes, 2020
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S.   +6 more
core   +2 more sources

Patterned Cipher Block for Low-Latency Secure Communication

open access: yesIEEE Access, 2020
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh   +2 more
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Lightweight cryptography ensures cryptography applications to devices with limited resources. Low-area implementations of linear layers usually play an essential role in lightweight cryptography.
Qun Liu   +5 more
doaj   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform

open access: yesFuture Internet, 2023
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor ...
Mohammed El-hajj   +2 more
doaj   +1 more source

Managed ecosystems of networked objects [PDF]

open access: yes, 2011
Small embedded devices such as sensors and actuators will become the cornerstone of the Future Internet. To this end, generic, open and secure communication and service platforms are needed in order to be able to exploit the new business opportunities ...
Bouckaert, Stefan   +4 more
core   +2 more sources

End-to-End Encryption in Resource-Constrained IoT Device

open access: yesIEEE Access, 2023
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj   +1 more source

Hardware Implementation of the GPS authentication [PDF]

open access: yes, 2012
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël   +2 more
core   +4 more sources

Home - About - Disclaimer - Privacy