Results 61 to 70 of about 22,567 (276)

ANALYSIS OF THE CHARACTERISTICS OF INTERNATIONAL STANDARD ALGORITHMS «LIGHTWEIGHT CRYPTOGRAPHY» – ISO/IEC 29192-3:2012

open access: yesInformatika, 2016
The data on the characteristics of international standard algorithms «lightweight cryptography» while application in hardware implementation based on microchips of FPGA are provided.
A. S. Poljakov, V. E. Samsonov
doaj  

Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages

open access: yesTASK Quarterly
The IoT technology is currently used in many areas and marked by growing popularity. On the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in terms of security and privacy protection.
Wiesław Maleszewski
doaj   +1 more source

Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid

open access: yesIEEE Access, 2019
The rise of the smart grid, which applies the Internet and smart metering technologies to the power system, results in massive, heterogeneous power data and a large number of attacks on the smart grid and causes great threats to the confidentiality and ...
Yuancheng Li, Pan Zhang, Rong Huang
doaj   +1 more source

3D‐Printed Porous Hydroxyapatite Formed via Enzymatic Mineralization

open access: yesAdvanced Functional Materials, EarlyView.
Bone combines lightness, strength, and the ability to heal, inspiring new materials design. This work introduces a room‐temperature, enzyme‐mediated 3D printing method to create porous hydroxyapatite scaffolds. The process avoids energy‐intensive sintering, preserves bioactivity, and allows control over porosity and mineralization.
Francesca Bono   +6 more
wiley   +1 more source

SLIM: A Lightweight Block Cipher for Internet of Health Things

open access: yesIEEE Access, 2020
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha   +4 more
doaj   +1 more source

Gourd‐Inspired Design of Unit Cell with Multiple Gradients for Physiological‐Range Pressure Sensing

open access: yesAdvanced Functional Materials, EarlyView.
Gourd‐shaped micro‐dome arrays with coordinated modulus, conductivity, and geometric gradients co‐optimize sensitivity and linearity in piezoresistive tactile sensors. Under pressure, a solid upper dome embeds into a porous lower dome, triggering rapid contact‐area growth and series‐to‐parallel conduction, enabling unsaturated, intensity‐resolved ...
Jiayi Xu   +6 more
wiley   +1 more source

Secure multi-party computation for analytics deployed as a lightweight web application [PDF]

open access: yes, 2016
We describe the definition, design, implementation, and deployment of a secure multi-party computation protocol and web application. The protocol and application allow groups of cooperating parties with minimal expertise and no specialized resources to ...
Bestavros, Azer   +4 more
core   +1 more source

Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

open access: yes, 2011
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy.
Alaghband, Mahdi R.   +2 more
core   +1 more source

Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control

open access: yesAdvanced Functional Materials, EarlyView.
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong   +7 more
wiley   +1 more source

Compact implementations of Curve Ed448 on low‐end IoT platforms

open access: yesETRI Journal, 2019
Elliptic curve cryptography is a relatively lightweight public‐key cryptography method for key generation and digital signature verification. Some lightweight curves (eg, Curve25519 and Curve Ed448) have been adopted by upcoming Transport Layer Security ...
Hwajeong Seo
doaj   +1 more source

Home - About - Disclaimer - Privacy