نتایج جستجو برای: nist lightweight cryptography competition
تعداد نتایج: 149027 فیلتر نتایج به سال:
Online banking systems allows consumers to access their banking accounts, review most recent transactions, request a current statement, transfer funds, view current bank rates and product information and reorder checks. These services that are offered by online banking systems are changing and being improved because of the intense competition between the banks. The major concern in online-banki...
The NIST run SHA-3 competition is nearing completion. Currently in its final round, the five remaining competitors are still being examined in hardware, software and for security metrics in order to select a final winner. While there have been many area and speed results reported, one such metric that does not appear to be covered in very great detail is that of power and energy measurements on...
Cryptography algorithms are a fundamental part of cryptographic system that is designed and implemented to increase information security. They the center attention experts in technology domains. Although cryptography attainthe goals such as confidentially, integrity authenticity designing, but other matters must be noticed by designers include speed, resource consumption, reliability, flexibili...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerged in the 1980s. During the 1990s, the number of hash function designs grew very quickly, but for many of these proposals security flaws were identified. MD5 and SHA-1 were deployed in an ever increasing number of applications, resulting in the name “Swiss army knifes” of cryptography. In spite of...
The extensive networking of devices and the large amount data generated from Internet Things (IoT) has brought security issues to attention researcher. Java is most common platform for embedded applications such as IoT, Wireless Sensors Networks (WSN), Near Field Communications (NFC) Radio Frequency Identification (RFID). object programming languages Java, SWIFT, PHP C++ use garbage collection ...
The task of this paper is to introduce a new lightweight identification protocol based on biometric data and elliptic curves. In fact, we combine biometric data and asymetric cryptography, namely elliptic curves and standard tools to design a multifactor identification protocol. Our scheme is light, very fast, secure and robust against all the known attacks on identification protocol. Therefore...
Internet Of Things is an evolution and superset of current internet of networks of computers. We are already on the way of connecting every Thing to internet, mobile internet focusing on 3G phones is a good pioneer example. Our focuses are turning from devices with high capability of computing and storage to those with constrained resources (CPU, memory, energy), from reliable transportations t...
LEES: a Hybrid Lightweight Elliptic ElGamal-Schnorr-Based Cryptography for Secure D2D Communications
In diesem Artikel wird ein Überblick über leichtgewichtige Kryptographie (lightweight Cryptography) gegeben. Weiterhin werden die beiden neuen auf Hardware optimierten Chiffren DESL und PRESENT näher vorgestellt. Der anschließende Vergleich der Implementierungsergebnisse mit anderen kürzlich vorgeschlagenen Blockchiffren wie mCrypton, HIGHT oder CLEFIA zeigt, dass DESL und PRESENT weniger Chipf...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید