نتایج جستجو برای: nist lightweight cryptography competition

تعداد نتایج: 149027  

2009
Nicholas W. D. Evans Corinne Fredouille Jean-François Bonastre

When multiple microphones are available estimates of inter-channel delay, which characterise a speaker’s location, can be used as features for speaker diarization. Background noise and reverberation can, however, lead to noisy features and poor performance. To ameliorate these problems, this paper presents a new approach to the discriminant analysis of delay features for speaker diarization. Th...

2015
Jonathan Klick Joshua D. Wright

Any Willing Provider and Freedom of Choice laws restrict the ability of managed care entities, including pharmacy benefit managers, to selectively contract with providers. The managed care entities argue this limits their ability to generate cost savings, while proponents of the laws suggest that such selective contracts limit competition, leading to an increase in aggregate costs. We examine t...

Journal: :ICST Trans. Security Safety 2013
Xinxin Fan Kalikinkar Mandal Guang Gong

Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch-Gong (WG) stream cipher family, for resource-constrained devices. WG-8 inherits the good randomness and cryptographic properties of the WG stream ...

Journal: :Wireless Networks 2011
Tameem Eissa Shukor Abd Razak Md. Asri Ngadi

Mobile Ad hoc Network (MANET) is a wireless technology for mobile nodes. This network is setup on fly without any infrastructure. The mobility nature of this network and the lack of infrastructure make it very challenging to be secured. In this paper, we introduce a formal model for Identity-based RSA (Id-RSA) scheme proven secure in the random oracle model. The proposed scheme relies on establ...

Journal: :International Journal of Power Electronics and Drive Systems 2023

It is important to create a cryptographic system such that the encryption does not depend on secret storage of algorithm part it, but only private key kept secret. In practice, management separate area cryptography, which considered problematic area. This paper describes main characteristics working with information. that, formation keys and information are stored external media. The random-num...

2014
Prabhat Kumar Kushwaha M. P. Singh Prabhat Kumar

Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic algorithms for security. Lightweight cryptography is used for resource constrained devices (which have limited memory, limited power and less processing capability) such as radio frequency identification (RFID) tags, contactless smart cards, wireless sensor network, health care devices and interne...

Journal: :IACR Cryptology ePrint Archive 2015
Sujoy Sinha Roy Kimmo Järvinen Ingrid Verbauwhede

We propose a lightweight coprocessor for 16-bit microcontrollers that implements high security elliptic curve cryptography. It uses a 283-bit Koblitz curve and offers 140-bit security. Koblitz curves offer fast point multiplications if the scalars are given as specific τ -adic expansions, which results in a need for conversions between integers and τ -adic expansions. We propose the first light...

Journal: :IEICE Transactions 2012
Shoichi Hirose Kota Ideguchi Hidenori Kuwakado Toru Owada Bart Preneel Hirotaka Yoshida

This paper proposes a new lightweight 256-bit hash function Lesamnta-LW. The security of Lesamnta-LW is reduced to that of the underlying AES-based block cipher and it is theoretically analyzed for an important application, namely the key-prefix mode. While most of recently proposed lightweight primitives are hardware-oriented with very small footprints, our main target with Lesamnta-LW is to a...

2002
John S. Garofolo Jonathan G. Fiscus Alvin F. Martin David S. Pallett Mark A. Przybocki

The National Institute of Standards and Technology (NIST) has been implementing evaluations of automatic speech transcription technologies for over 15 years. NIST has helped guide progress in these technologies by: creating increasingly challenging and realistic tests, helping to provide associated linguistic resources, employing uniform metrics and analyses across systems to assess performance...

2009
Jean-Philippe Aumasson Orr Dunkelman Florian Mendel Christian Rechberger Søren S. Thomsen

Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on both versions of Vortex, including collisions, second preimages, preimages, and distinguishers. Our attacks exploit flaws both in the high-level design and in the lower-level algorithms.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید