Results 1 to 10 of about 807,165 (362)
Symmetric Cryptography 2 [PDF]
Symmetric cryptology is one of the two main branches of cryptology. Its applications are essential and vital in the Information Age, due to the efficiency of its constructions.The scope of this book in two volumes is two-fold. First, it presents the most important ideas that have been used in the design of symmetric primitives, their inner components ...
Christina Boura, María Naya‐Plasencia
semanticscholar +5 more sources
The advent of the Internet of Things (IoT) has revolutionized the way we, as a society, perform different daily tasks, such as healthcare. The Internet of Health Things (IoHT) is an example of the IoT specialization handling sensitive user data and ...
Kristtopher Kayo Coelho +5 more
doaj +2 more sources
Architectural support for fast symmetric-key cryptography [PDF]
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides the mechanisms necessary to implement accountability, accuracy, and confidentiality in communication.
Jerome Burke +2 more
+9 more sources
Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography. [PDF]
Despite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats.
Mansoor K +5 more
europepmc +2 more sources
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
Hao Cheng +4 more
doaj +2 more sources
On the Use of Cellular Automata in Symmetric Cryptography [PDF]
25 pages, 0 ...
A. Fúster-Sabater, Pino Caballero‐Gil
openalex +4 more sources
A Lightweight Certificateless Authenticated Key Agreement Scheme Based on Chebyshev Polynomials for the Internet of Drones [PDF]
The Internet of Drones (IoD) overcomes the physical limitations of traditional ground networks with its dynamic topology and 3D spatial flexibility, playing a crucial role in various fields.
Zhaobin Li +4 more
doaj +2 more sources
Genetic Operators Applied to Symmetric Cryptography
In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic.
Jefferson Rodríguez +2 more
doaj +2 more sources
SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been studied extensively.
Christoph Dobraunig +5 more
doaj +2 more sources
Contains fulltext : 310914.pdf (Publisher’s version ) (Open Access)
Seán Murphy, Rachel Player
openalex +3 more sources

