نتایج جستجو برای: lightweight cryptography

تعداد نتایج: 58663  

Journal: :Applied sciences 2023

A quantum computer capable of running the Grover search algorithm, which reduces complexity brute-force attacks by a square root, has potential to undermine security strength symmetric-key cryptography and hash functions. Recently, studies on approaches have proposed analyzing using algorithm in conjunction with optimized circuit implementations for Analyzing cipher (i.e., cryptanalysis) estima...

2017
Alireza Esfahani Georgios Mantas Rainer Matischek Firooz B. Saghezchi Jonathan Rodriguez Ani Bicaku Silia Maksuti Markus Tauber Christoph Schmittner Joaquim Bastos

In the emerging Industrial IoT era, Machine-toMachine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices (e.g., sensors, actuators, gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the I...

2014
Sanaz Rahimi Moosavi Ethiopia Nigussie Seppo Virtanen Jouni Isoaho

In this paper, a secure mutual authentication scheme for an RFID implant system is developed. An insecure communication channel between a tag and a reader makes the RFID implant system vulnerable to attacks and endangers the user’s safety and privacy. The proposed scheme relies on elliptic curve cryptography and the D-Quark lightweight hash design. Compared to the available public-key cryptosys...

2013
Kishan Chand Gupta Indranil Ghosh Ray

Maximum distance separable (MDS) matrices have applications not only in coding theory but also are of great importance in the design of block ciphers and hash functions. It is highly nontrivial to find MDS matrices which could be used in lightweight cryptography. In a crypto 2011 paper, Guo et. al. proposed a new MDS matrix Serial(1, 2, 1, 4) over F28 . This representation has a compact hardwar...

Journal: :CoRR 2017
Bahram Rashidi

In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly advanced. ECC, with much smaller key sizes, offers equivalent security when compared to other asymmetric cryptosystems. In this survey, an comprehensive overview of hardware implementations of ECC is provided. We first discuss different elliptic curves, point multiplication algorithms and underling finite field ...

2007
Miika Komu Sasu Tarkoma

The ubiquity of truly mobile appliances such as Wi-Fi-enabled mobile phones, PDAs, and Internet web pads stands in stark contrast to the lack of mobility support in today’s communication protocols. Many of these devices are multihomed and use standard protocols like IP and TCP, which have been designed for non-mobile computers with a single network device. Therefore, they are not able to cope w...

2013
Wen-Tsai Ko Shin-Yan Chiou Erl-Huei Lu Henry Ker-Chang Chang

An RFID (Radio-Frequency IDentification) system provides the mechanism to identify tags to readers and then to execute specific RFID-enabled applications. In those applications, secure protocols using lightweight cryptography need to be developed and the privacy of tags must be ensured. In 2010, Batina et al. proposed a privacy-preserving grouping proof protocol for RFID based on ECC (Elliptic ...

2016
Győző Gódor

Radio frequency identification technology is becoming ubiquitous, and as an unfortunate side effect, more and more authentication solutions come with more security issues. In former contributions, the authors introduced a solely hash-based secure authentication algorithm that is capable of providing protection against most of the well-known attacks and performs exceptionally well even in very l...

2008
Manuel Koschuch Johann Großschädl Udo Payer Matthias Hudler Michael Krüger

Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing power, memory capacity and network speed. In this paper we describe a lightweight implementation of the Secure Sockets Layer (SSL) protocol with a focus on small code size and low memory usage. We integrated a generic public-k...

2016
Suresh Varma

Today we are using tiny devices to make our life comfortable. These devices are also helpful to alert the society about unwanted happenings and discover the hidden knowledge from the environment/nature. In this process, the communication among the devices must to be reliable, robust, and more secure. But these networked devices (WSNs) are operated with limited resources like computation, commun...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید