Lightweight cryptography methods

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Studies in Lightweight Cryptography

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Hadi Soleimany Name of the doctoral dissertation Studies in Lightweight Cryptography Publisher School of Science Unit Department of Information and Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 211/2014 Field of research Theoretical Computer Science Manuscript submitted 26 September 2014 Da...

متن کامل

Final Lightweight Cryptography Status Report

Project co-funded by the European Commission within the 7th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) The information in this do...

متن کامل

Second Lightweight Cryptography Status Report

The design of lightweight block ciphers has been a very active research topic over the last years. However, the lack of comparative source codes generally makes it hard to evaluate the extent to which different ciphers actually reach their low-cost goals, on different platforms. This paper reports on an initiative aimed to partially relax this issue. First, we implemented 11 block ciphers on an...

متن کامل

Lightweight Cryptography for the Internet of Things

This paper gives an overview of the state-of-the-art technology and standardization status of lightweight cryptography, which can be implemented efficiently in constrained devices. This technology enables secure and efficient communication between networked smart objects.

متن کامل

Networked RFID Systems and Lightweight Cryptography

This book is a comprehensive guide to networks of Radio Frequency Identification (RFID) based Electronic Product Codes (EPCs) in supply chains, and its topics range from standardised hardware designs through known vulnerabilities, security and privacy models, and to concrete proposals for RFID authentication in various scenarios: machine readable documents, oneand two-way authentication in supp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cyber Security Technology

سال: 2017

ISSN: 2374-2917,2374-2925

DOI: 10.1080/23742917.2017.1384917