نتایج جستجو برای: lightweight cryptography
تعداد نتایج: 58663 فیلتر نتایج به سال:
Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is called encryption. On the other communication side, the decryption process will be done and the data wil...
Physical Unclonable Functions (PUFs) have emerged as a lightweight alternative to traditional cryptography. The fact that no secret key needs to be stored in non-volatile memory makes PUFs especially well suited for embedded systems in which securely generating and storing secret keys is difficult and expensive. Compared to traditional cryptography, PUFs are often believed to be more resistant ...
Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is called encryption. On the other communication side, the decryption process will be done and the data wil...
Many block ciphers and hash functions require the diffusion property of Maximum Distance Separable (MDS) matrices. Serial matrices with the MDS property obtain a trade-off between area requirement and clock cycle performance to meet the needs of lightweight cryptography. In this paper, we propose a new class of serial-type matrices called Diagonal-Serial Invertible (DSI) matrices with the spars...
Wireless sensor networks (WSNs) will play an active role in the 21th Century Healthcare IT to reduce the healthcare cost and improve the quality of care. The protection of data confidentiality and patient privacy are the most critical requirements for the ubiquitous use of WSNs in healthcare environments. This requires a secure and lightweight user authentication and access control. Symmetric k...
In the last few years, the field of lightweight cryptography has seen an influx in the number of block ciphers and hash functions being proposed. One of the metrics that define a good lightweight design is the energy consumed per unit operation of the algorithm. For block ciphers, this operation is the encryption of one plaintext. By studying the energy consumption model of a CMOS gate, we arri...
The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly decode secret encrypted keys and making network vulnerable hacking. They can mathematical problems almost instantaneously compared billions of years computation needed by traditional computing machines. Researchers advocate development novel strategies include data encryption ...
Due to the growing need use devices with low hardware resources in everyday life, likelihood of their susceptibility various cyber-attacks increases. In this regard, one methods ensure security information circulating these is encryption. For small resources, most applicable low-resource (lightweight) cryptography. This article introduces a new lightweight encryption algorithm, ISL-LWS (Informa...
the design of cement slurry for horizontal wellbores is challenging as it must present very high quality cement slurry properties e.g. zero free water, less than 50 cc api fluid loss value, appropriate rheology and yield point for effective displacement, adequate compressive strength, which is critical for lightweight slurries, and finally stable cement column behind casing. the main objective ...
In this paper, we analyze the collision resistance of two smallest versions Keccak which have a width 200 and 400 bits respectively. We show that algebraic linearization techniques can serve cryptanalysis by using some interesting properties linear part round function Keccak. present an attack on could be used in lightweight cryptography reduced to rounds. For Keccak[40, 160] (resp. Keccak[72, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید