Results 31 to 40 of about 23,485 (319)

Evaluating the Performance of Lightweight Ciphers in Constrained Environments—The Case of Saturnin

open access: yesSignals, 2022
The use of lightweight cryptographic algorithms is essential for addressing security in highly constrained environments such as the Internet of Things. In this paper, the performance of lightweight block ciphers in such highly constrained environments is
Panagiotis Podimatas   +1 more
doaj   +1 more source

Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions

open access: yesIEEE Access, 2022
It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services.
Roayat I. Abdelfatah   +2 more
doaj   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

A-VIP: Anonymous Verification and Inference of Positions in Vehicular Networks [PDF]

open access: yes, 2013
MiniconferenceInternational audienceKnowledge of the location of vehicles and tracking of the routes they follow are a requirement for a number of applications, including e-tolling and liability attribution in case of accidents.
Borgiattino, Carlo   +5 more
core   +3 more sources

Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]

open access: yes, 2015
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet   +4 more
core   +1 more source

RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
Hao Cheng   +4 more
doaj   +1 more source

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Evaluation of SPN-Based Lightweight Crypto-Ciphers

open access: yesIEEE Access, 2019
Lightweight cryptography has recently emerged as a strong requirement for any highly constrained connected device; encryption/decryption processes must strike the balance between speed, area, power efficiency, and security robustness.
Loic Dalmasso   +3 more
doaj   +1 more source

Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The sponge construction is a popular method for hashing. Quickly after its introduction, the sponge was proven to be tightly indifferentiable from a random oracle up to ≈ 2c/2 queries, where c is the capacity.
Charlotte Lefevre
doaj   +1 more source

Lightweight Cryptography for FPGAs

open access: yes2009 International Conference on Reconfigurable Computing and FPGAs, 2009
The advent of new low-power Field Programmable Gate Arrays (FPGA) for battery powered devices opens a host of new applications to FPGAs. In order to provide security on resource constrained devices lightweight cryptographic algorithms have been developed. However, there has not been much research on porting these algorithms to FPGAs.
Panasayya Yalla, Jens-Peter Kaps
openaire   +2 more sources

Home - About - Disclaimer - Privacy