Results 21 to 30 of about 23,485 (319)

Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform

open access: yesFuture Internet, 2023
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor ...
Mohammed El-hajj   +2 more
doaj   +1 more source

KLEIN: A New Family of Lightweight Block Ciphers [PDF]

open access: yes, 2010
Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes.
A. Bogdanov   +39 more
core   +6 more sources

End-to-End Encryption in Resource-Constrained IoT Device

open access: yesIEEE Access, 2023
Internet of Things (IoT) technologies will interconnect with a wide range of network devices, regardless of their local network and resource capacities.
Ala Saleh D. Alluhaidan, P. Prabu
doaj   +1 more source

Hardware Implementation of the GPS authentication [PDF]

open access: yes, 2012
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël   +2 more
core   +4 more sources

ANALYSIS OF THE CHANGE OF THE CONCEPT «FINANCIAL CRYPTOGRAPHY» ON THE BASIS OF 20 YEARS SUBJECTS OF THE INTERNATIONAL CONFERENCE «FINANCIAL CRYPTOGRAPHY AND DATA SECURITY»

open access: yesСтатистика и экономика, 2016
The article discusses the concept of «financial cryptography», which appeared in 1997 in the eponymous conference title and used abroad to date along with concepts of «quantum cryptography», «post-quantumcryptography», «lightweight cryptography» and ...
Alexander A. Varfolomeev
doaj   +1 more source

A Security Framework for JXTA-Overlay [PDF]

open access: yes, 2009
En l'actualitat, la maduresa del camp de la investigació P2P empès a través de nous problemes, relacionats amb la seguretat. Per aquesta raó, la seguretat comença a convertir-se en una de les qüestions clau en l'avaluació d'un sistema P2P, i és important
Arnedo Moreno, Joan   +3 more
core   +3 more sources

IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2022
The object of the study is the processes of building groups of symmetric double-operand operations of cryptographic coding of information. The subject of the study are features of the implementation of a generalized method of synthesis groups of ...
Nataliia Lada, Yuliia Rudnytska
doaj   +1 more source

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]

open access: yes, 2008
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core   +2 more sources

I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context

open access: yes, 2020
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography.
AA Ciss   +10 more
core   +1 more source

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj   +1 more source

Home - About - Disclaimer - Privacy