Results 51 to 60 of about 22,667 (173)

A Scoping Study on Lightweight Cryptography Reviews in IoT

open access: yesمجلة بغداد للعلوم, 2021
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms.
Ikenna Rene Chiadighikaobi   +1 more
doaj   +1 more source

Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages

open access: yesTASK Quarterly
The IoT technology is currently used in many areas and marked by growing popularity. On the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in terms of security and privacy protection.
Wiesław Maleszewski
doaj   +1 more source

Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid

open access: yesIEEE Access, 2019
The rise of the smart grid, which applies the Internet and smart metering technologies to the power system, results in massive, heterogeneous power data and a large number of attacks on the smart grid and causes great threats to the confidentiality and ...
Yuancheng Li, Pan Zhang, Rong Huang
doaj   +1 more source

Semi-Trusted Mixer Based Privacy Preserving Distributed Data Mining for Resource Constrained Devices [PDF]

open access: yes, 2010
In this paper a homomorphic privacy preserving association rule mining algorithm is proposed which can be deployed in resource constrained devices (RCD).
Kaosar, Md. Golam, Yi, Xun
core   +1 more source

BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs

open access: yes, 2016
-Wireless body area network(WBAN) has shown great potential in improving healthcare quality not only for patients but also for medical staff. However, security and privacy are still an important issue in WBANs especially in multi-hop architectures.
Chaudet, Claude   +2 more
core   +3 more sources

ANALYSIS OF THE CHARACTERISTICS OF INTERNATIONAL STANDARD ALGORITHMS «LIGHTWEIGHT CRYPTOGRAPHY» – ISO/IEC 29192-3:2012

open access: yesInformatika, 2016
The data on the characteristics of international standard algorithms «lightweight cryptography» while application in hardware implementation based on microchips of FPGA are provided.
A. S. Poljakov, V. E. Samsonov
doaj  

SLIM: A Lightweight Block Cipher for Internet of Health Things

open access: yesIEEE Access, 2020
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha   +4 more
doaj   +1 more source

Exhaustive Search for Small Dimension Recursive MDS Diffusion Layers for Block Ciphers and Hash Functions

open access: yes, 2013
This article presents a new algorithm to find MDS matrices that are well suited for use as a diffusion layer in lightweight block ciphers. Using an recursive construction, it is possible to obtain matrices with a very compact description. Classical field
Augot, Daniel, Finiasz, Matthieu
core   +2 more sources

Compact implementations of Curve Ed448 on low‐end IoT platforms

open access: yesETRI Journal, 2019
Elliptic curve cryptography is a relatively lightweight public‐key cryptography method for key generation and digital signature verification. Some lightweight curves (eg, Curve25519 and Curve Ed448) have been adopted by upcoming Transport Layer Security ...
Hwajeong Seo
doaj   +1 more source

Nonce‐misuse resilience of Romulus‐N and GIFT‐COFB

open access: yesIET Information Security, 2023
Nonce‐misuse resilience (NMRL) security of Romulus‐N and GIFT‐COFB is analysed, the two finalists of NIST Lightweight Cryptography project for standardising lightweight authenticated encryption. NMRL, introduced by Ashur et al.
Akiko Inoue   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy