Results 31 to 40 of about 22,667 (173)

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The sponge construction is a popular method for hashing. Quickly after its introduction, the sponge was proven to be tightly indifferentiable from a random oracle up to ≈ 2c/2 queries, where c is the capacity.
Charlotte Lefevre
doaj   +1 more source

I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context

open access: yes, 2020
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography.
AA Ciss   +10 more
core   +1 more source

Evaluation of SPN-Based Lightweight Crypto-Ciphers

open access: yesIEEE Access, 2019
Lightweight cryptography has recently emerged as a strong requirement for any highly constrained connected device; encryption/decryption processes must strike the balance between speed, area, power efficiency, and security robustness.
Loic Dalmasso   +3 more
doaj   +1 more source

Lightweight Cryptography for FPGAs

open access: yes2009 International Conference on Reconfigurable Computing and FPGAs, 2009
The advent of new low-power Field Programmable Gate Arrays (FPGA) for battery powered devices opens a host of new applications to FPGAs. In order to provide security on resource constrained devices lightweight cryptographic algorithms have been developed. However, there has not been much research on porting these algorithms to FPGAs.
Panasayya Yalla, Jens-Peter Kaps
openaire   +2 more sources

Power and Energy Issues on Lightweight Cryptography [PDF]

open access: yesJournal of Low Power Electronics, 2017
Ministerio de Economía y Competitividad TEC2013-45523-R, TEC2016-80549 ...
Acosta Jiménez, Antonio José   +3 more
openaire   +4 more sources

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network

open access: yes, 2018
Coding Opportunistically (COPE) is a simple but very effective data coding mechanism in the wireless network. However, COPE leaves risks for attackers easily getting the private information saved in the packets, when they move through the network to ...
Bahri, Leila   +3 more
core   +1 more source

Improved 2-round collision attack on IoT hash standard ASCON-HASH

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj   +1 more source

SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly not so mature, yet it has large impact in performance ...
Yusuke Naito   +3 more
doaj   +1 more source

Secure and Efficient Authentication Scheme in IoT Environments

open access: yesApplied Sciences, 2021
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments.
Abhijeet Thakare, Young-Gab Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy