Results 41 to 50 of about 23,485 (319)
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation
Lightweight cryptography in computationally constrained devices is actively studied. In contrast to advances of lightweight blockcipher in the last decade, lightweight mode of operation is seemingly not so mature, yet it has large impact in performance ...
Yusuke Naito +3 more
doaj +1 more source
Improved 2-round collision attack on IoT hash standard ASCON-HASH
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai +4 more
doaj +1 more source
Secure and Efficient Authentication Scheme in IoT Environments
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments.
Abhijeet Thakare, Young-Gab Kim
doaj +1 more source
This study presents micropleated filters manufactured by needleless electrospinning. Nanofibers are deposited onto uniaxially pre‐stretched substrates that contract upon release, forming densely packed micropleats. This architecture increases effective surface area without enlarging the filter size, achieving quality factors comparable to those of ...
Aleksandr Fadeev +6 more
wiley +1 more source
Systematization of a 256-bit lightweight block cipher Marvin [PDF]
In a world heavily loaded by information, there is a great need for keeping specific information secure from adversaries. The rapid growth in the research field of lightweight cryptography can be seen from the list of the number of lightweight stream as ...
Bhattacharya, Abhishek +2 more
core +1 more source
This article presents a solver‐agnostic domain‐specific language (DSL) for computational structural mechanics that strengthens interoperability in virtual product development. Using a hierarchical data model, the DSL enables seamless exchange between diverse simulation tools and numerical methods.
Martin Rädel +3 more
wiley +1 more source
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj +1 more source
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying
Christof Beierle +8 more
doaj +1 more source
The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT specialization handling sensitive user data and ...
Kristtopher Kayo Coelho +5 more
doaj +1 more source
Cr0.9Si0.1 protective coatings are developed to enhance the thermal‐shock and oxidation resistance of Mg2Si0.89(Sn0.1,Sb0.01) thermoelectric (TE) materials. The coating forms a dense and adherent barrier that suppresses oxygen diffusion and mitigates mechanical degradation during cyclic oxidation, demonstrating its potential to improve the long‐term ...
Mikdat Gurtaran +3 more
wiley +1 more source

