نتایج جستجو برای: nist lightweight cryptography competition

تعداد نتایج: 149027  

2014
Anand Sharma

Online banking systems allows consumers to access their banking accounts, review most recent transactions, request a current statement, transfer funds, view current bank rates and product information and reorder checks. These services that are offered by online banking systems are changing and being improved because of the intense competition between the banks. The major concern in online-banki...

Journal: :IACR Cryptology ePrint Archive 2012
Brian Baldwin William P. Marnane

The NIST run SHA-3 competition is nearing completion. Currently in its final round, the five remaining competitors are still being examined in hardware, software and for security metrics in order to select a final winner. While there have been many area and speed results reported, one such metric that does not appear to be covered in very great detail is that of power and energy measurements on...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

Cryptography algorithms are a fundamental part of cryptographic system that is designed and implemented to increase information security. They the center attention experts in technology domains. Although cryptography attainthe goals such as confidentially, integrity authenticity designing, but other matters must be noticed by designers include speed, resource consumption, reliability, flexibili...

2010
Bart Preneel

The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerged in the 1980s. During the 1990s, the number of hash function designs grew very quickly, but for many of these proposals security flaws were identified. MD5 and SHA-1 were deployed in an ever increasing number of applications, resulting in the name “Swiss army knifes” of cryptography. In spite of...

Journal: :alexandria engineering journal 2021

The extensive networking of devices and the large amount data generated from Internet Things (IoT) has brought security issues to attention researcher. Java is most common platform for embedded applications such as IoT, Wireless Sensors Networks (WSN), Near Field Communications (NFC) Radio Frequency Identification (RFID). object programming languages Java, SWIFT, PHP C++ use garbage collection ...

Journal: :CoRR 2014
Abdoulaye Mbaye Abdoul Aziz Ciss Oumar Nian

The task of this paper is to introduce a new lightweight identification protocol based on biometric data and elliptic curves. In fact, we combine biometric data and asymetric cryptography, namely elliptic curves and standard tools to design a multifactor identification protocol. Our scheme is light, very fast, secure and robust against all the known attacks on identification protocol. Therefore...

2012
S. Zhou

Internet Of Things is an evolution and superset of current internet of networks of computers. We are already on the way of connecting every Thing to internet, mobile internet focusing on 3G phones is a good pioneer example. Our focuses are turning from devices with high capability of computing and storage to those with constrained resources (CPU, memory, energy), from reliable transportations t...

2007
Christof Paar Axel Poschmann

In diesem Artikel wird ein Überblick über leichtgewichtige Kryptographie (lightweight Cryptography) gegeben. Weiterhin werden die beiden neuen auf Hardware optimierten Chiffren DESL und PRESENT näher vorgestellt. Der anschließende Vergleich der Implementierungsergebnisse mit anderen kürzlich vorgeschlagenen Blockchiffren wie mCrypton, HIGHT oder CLEFIA zeigt, dass DESL und PRESENT weniger Chipf...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید