Results 61 to 70 of about 22,567 (276)
The data on the characteristics of international standard algorithms «lightweight cryptography» while application in hardware implementation based on microchips of FPGA are provided.
A. S. Poljakov, V. E. Samsonov
doaj
Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages
The IoT technology is currently used in many areas and marked by growing popularity. On the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in terms of security and privacy protection.
Wiesław Maleszewski
doaj +1 more source
Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid
The rise of the smart grid, which applies the Internet and smart metering technologies to the power system, results in massive, heterogeneous power data and a large number of attacks on the smart grid and causes great threats to the confidentiality and ...
Yuancheng Li, Pan Zhang, Rong Huang
doaj +1 more source
3D‐Printed Porous Hydroxyapatite Formed via Enzymatic Mineralization
Bone combines lightness, strength, and the ability to heal, inspiring new materials design. This work introduces a room‐temperature, enzyme‐mediated 3D printing method to create porous hydroxyapatite scaffolds. The process avoids energy‐intensive sintering, preserves bioactivity, and allows control over porosity and mineralization.
Francesca Bono +6 more
wiley +1 more source
SLIM: A Lightweight Block Cipher for Internet of Health Things
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient for high-resource desktop computers.
Bassam Aboushosha +4 more
doaj +1 more source
Gourd‐Inspired Design of Unit Cell with Multiple Gradients for Physiological‐Range Pressure Sensing
Gourd‐shaped micro‐dome arrays with coordinated modulus, conductivity, and geometric gradients co‐optimize sensitivity and linearity in piezoresistive tactile sensors. Under pressure, a solid upper dome embeds into a porous lower dome, triggering rapid contact‐area growth and series‐to‐parallel conduction, enabling unsaturated, intensity‐resolved ...
Jiayi Xu +6 more
wiley +1 more source
Secure multi-party computation for analytics deployed as a lightweight web application [PDF]
We describe the definition, design, implementation, and deployment of a secure multi-party computation protocol and web application. The protocol and application allow groups of cooperating parties with minimal expertise and no specialized resources to ...
Bestavros, Azer +4 more
core +1 more source
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy.
Alaghband, Mahdi R. +2 more
core +1 more source
Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong +7 more
wiley +1 more source
Compact implementations of Curve Ed448 on low‐end IoT platforms
Elliptic curve cryptography is a relatively lightweight public‐key cryptography method for key generation and digital signature verification. Some lightweight curves (eg, Curve25519 and Curve Ed448) have been adopted by upcoming Transport Layer Security ...
Hwajeong Seo
doaj +1 more source

