Results 21 to 30 of about 67,860 (295)
Securing the Future Internet of Things with Post-Quantum Cryptography [PDF]
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real-time application using traditional or lightweight cryptography primitives and protocols does not ensure full-proof security. Post-quantum Cryptography is important for the Internet of Things (IoT) due to its security against Quantum ...
arxiv +1 more source
Power and Energy Issues on Lightweight Cryptography [PDF]
Ministerio de Economía y Competitividad TEC2013-45523-R, TEC2016-80549 ...
Acosta Jiménez, Antonio José+3 more
openaire +3 more sources
Security of Neural Network-Based Key Agreement Protocol for Smart Grids
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms.
Miłosz Stypiński, Marcin Niemiec
doaj +1 more source
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT [PDF]
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel approach in progress towards internet-of-things (IoT) security.
arxiv +1 more source
Patterned Cipher Block for Low-Latency Secure Communication
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh+2 more
doaj +1 more source
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang+5 more
doaj +1 more source
Lightweight Blockchain Solutions: Taxonomy, Research Progress, and Comprehensive Review [PDF]
The proliferation of resource-constrained devices has become prevalent across various digital applications, including smart homes, smart healthcare, and smart transportation, among others. However, the integration of these devices brings many security issues.
arxiv +1 more source
More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs
Lightweight cryptography ensures cryptography applications to devices with limited resources. Low-area implementations of linear layers usually play an essential role in lightweight cryptography.
Qun Liu+5 more
doaj +1 more source
End-to-End Encryption in Resource-Constrained IoT Device
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj +1 more source
Lightweight Cryptography for FPGAs
The advent of new low-power Field Programmable Gate Arrays (FPGA) for battery powered devices opens a host of new applications to FPGAs. In order to provide security on resource constrained devices lightweight cryptographic algorithms have been developed. However, there has not been much research on porting these algorithms to FPGAs.
Panasayya Yalla, Jens-Peter Kaps
openaire +3 more sources