Results 21 to 30 of about 67,860 (295)

Securing the Future Internet of Things with Post-Quantum Cryptography [PDF]

open access: yesSecurity and Privacy 5 (2), e20, 2022, 2022
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real-time application using traditional or lightweight cryptography primitives and protocols does not ensure full-proof security. Post-quantum Cryptography is important for the Internet of Things (IoT) due to its security against Quantum ...
arxiv   +1 more source

Power and Energy Issues on Lightweight Cryptography [PDF]

open access: yesJournal of Low Power Electronics, 2017
Ministerio de Economía y Competitividad TEC2013-45523-R, TEC2016-80549 ...
Acosta Jiménez, Antonio José   +3 more
openaire   +3 more sources

Security of Neural Network-Based Key Agreement Protocol for Smart Grids

open access: yesEnergies, 2023
Recent developments in quantum computing pose a significant threat to the asymmetric cryptography currently in use. Neural cryptography offers a potential alternative that is resistant to attacks of known quantum computer algorithms.
Miłosz Stypiński, Marcin Niemiec
doaj   +1 more source

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT [PDF]

open access: yes10th international conference on Cryptography and Information Security 2021, 2021
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel approach in progress towards internet-of-things (IoT) security.
arxiv   +1 more source

Patterned Cipher Block for Low-Latency Secure Communication

open access: yesIEEE Access, 2020
Despite the increasing importance of network security, increasing Internet of Things (IoT) uptake and traffic tends to apply tighter resource constraints for cryptography.
Seounghwan Oh   +2 more
doaj   +1 more source

Efficient Implementation of PRESENT and GIFT on Quantum Computers

open access: yesApplied Sciences, 2021
Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search algorithm is applied to symmetric key cryptography, the security level of target symmetric key ...
Kyungbae Jang   +5 more
doaj   +1 more source

Lightweight Blockchain Solutions: Taxonomy, Research Progress, and Comprehensive Review [PDF]

open access: yes24(2023)100984, 2022
The proliferation of resource-constrained devices has become prevalent across various digital applications, including smart homes, smart healthcare, and smart transportation, among others. However, the integration of these devices brings many security issues.
arxiv   +1 more source

More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Lightweight cryptography ensures cryptography applications to devices with limited resources. Low-area implementations of linear layers usually play an essential role in lightweight cryptography.
Qun Liu   +5 more
doaj   +1 more source

End-to-End Encryption in Resource-Constrained IoT Device

open access: yesIEEE Access, 2023
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj   +1 more source

Lightweight Cryptography for FPGAs

open access: yes2009 International Conference on Reconfigurable Computing and FPGAs, 2009
The advent of new low-power Field Programmable Gate Arrays (FPGA) for battery powered devices opens a host of new applications to FPGAs. In order to provide security on resource constrained devices lightweight cryptographic algorithms have been developed. However, there has not been much research on porting these algorithms to FPGAs.
Panasayya Yalla, Jens-Peter Kaps
openaire   +3 more sources

Home - About - Disclaimer - Privacy