Results 31 to 40 of about 22,567 (276)
Evaluation of SPN-Based Lightweight Crypto-Ciphers
Lightweight cryptography has recently emerged as a strong requirement for any highly constrained connected device; encryption/decryption processes must strike the balance between speed, area, power efficiency, and security robustness.
Loic Dalmasso +3 more
doaj +1 more source
Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks
The sponge construction is a popular method for hashing. Quickly after its introduction, the sponge was proven to be tightly indifferentiable from a random oracle up to ≈ 2c/2 queries, where c is the capacity.
Charlotte Lefevre
doaj +1 more source
A security architecture for personal networks [PDF]
Personal Network (PN) is a new concept utilizing pervasive computing to meet the needs of the user. As PNs edge closer towards reality, security becomes an important concern since any vulnerability in the system will limit its practical use.
Heemstra de Groot, Sonia M. +1 more
core +2 more sources
Lightweight Cryptography for FPGAs
The advent of new low-power Field Programmable Gate Arrays (FPGA) for battery powered devices opens a host of new applications to FPGAs. In order to provide security on resource constrained devices lightweight cryptographic algorithms have been developed. However, there has not been much research on porting these algorithms to FPGAs.
Panasayya Yalla, Jens-Peter Kaps
openaire +2 more sources
Power and Energy Issues on Lightweight Cryptography [PDF]
Ministerio de Economía y Competitividad TEC2013-45523-R, TEC2016-80549 ...
Acosta Jiménez, Antonio José +3 more
openaire +4 more sources
Improved 2-round collision attack on IoT hash standard ASCON-HASH
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai +4 more
doaj +1 more source
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly not so mature, yet it has large impact in performance ...
Yusuke Naito +3 more
doaj +1 more source
Secure and Efficient Authentication Scheme in IoT Environments
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments.
Abhijeet Thakare, Young-Gab Kim
doaj +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
Systematization of a 256-bit lightweight block cipher Marvin [PDF]
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as ...
Bhattacharya, Abhishek +2 more
core +1 more source

