Results 21 to 30 of about 23,485 (319)
Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor ...
Mohammed El-hajj +2 more
doaj +1 more source
KLEIN: A New Family of Lightweight Block Ciphers [PDF]
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov +39 more
core +6 more sources
End-to-End Encryption in Resource-Constrained IoT Device
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj +1 more source
Hardware Implementation of the GPS authentication [PDF]
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël +2 more
core +4 more sources
The article discusses the concept of «financial cryptography», which appeared in 1997 in the eponymous conference title and used abroad to date along with concepts of «quantum cryptography», «post-quantumcryptography», «lightweight cryptography» and ...
Alexander A. Varfolomeev
doaj +1 more source
A Security Framework for JXTA-Overlay [PDF]
En l'actualitat, la maduresa del camp de la investigació P2P empès a través de nous problemes, relacionats amb la seguretat. Per aquesta raó, la seguretat comença a convertir-se en una de les qüestions clau en l'avaluació d'un sistema P2P, i és important
Arnedo Moreno, Joan +3 more
core +3 more sources
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of ...
Nataliia Lada, Yuliia Rudnytska
doaj +1 more source
Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core +2 more sources
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography.
AA Ciss +10 more
core +1 more source
Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj +1 more source

