نتایج جستجو برای: lightweight cryptography
تعداد نتایج: 58663 فیلتر نتایج به سال:
Providing security in low-cost RFID tags is a challenging task because tags are highly resource constrained and cannot support strong cryptography. Special lightweight algorithms and protocols need to be designed that take into account the limitations of the tags. In this paper, we propose a set of extremely lightweight tag authentication protocols. We also provide an analysis of the proposed p...
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices. Since the outcome likely have significant, long-lived impact, careful evaluation of each submission with respect metrics explicitly outlined in call imperative. Beyond robustness submissions against cryptanalytic attack, related their impl...
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies literature report the enhancement of conventional cryptographic algorithms development new algorithms. This significant number resulted rise many review on LWC IoT. Due to vast IoT, it is not known what cover how extensive are. Therefore, this article aimed bridge gap by conductin...
NIST’s Lightweight Cryptography Project ties selected crypto graphic algorithms to a profile, which captures the physical, performance and security characteristics of the target devices that run these algorithms. This contribution investigates the role of energy in the profile. For many of the important application domains of Lightweight Cryptography, the opera tion is intermittent, rather th...
This paper gives an overview of the state-of-the-art technology and standardization status of lightweight cryptography, which can be implemented efficiently in constrained devices. This technology enables secure and efficient communication between networked smart objects.
The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results are often concerned with a core computation and when it comes to a real implementation there can be significant hidden overheads. In this paper we consider the case of cryptoGPS and we outline a full implementation that has bee...
1. Panasenko, S., & Smagin, S., “Lightweight Cryptography: Underlying Principles and Approaches”, International Journal of Computer Theory and Engineering, Vol 3 No.4, (2011). 2. S. Salim and I. Taha, "Lightweight block ciphers: comparative study," Journal of Advanced Computer Science and Technology Research (JACSTR), vol. 2, pp. 159-165, 2012. 3. J. Borghoff, et al., "PRINCE – A Low-Latency Bl...
Electronic-commerce (e-commerce) has become a provider of distinctive services to individuals and companies due the speed flexibility transferring orders completing commercial deals across far different places. However, increasing attacks on penetrating transaction information or tampering with e-commerce requests, interest in protecting this hiding it from tamperers extremely important. In add...
Lightweight cryptography algorithms are increasing in value because they can enhance security under limited resources. National Institute of Standards and Technology is working on standardising lightweight authenticated encryption with associated data. Thirty-two candidates included the second round NIST selection process, their specifications differ respect to various points. Therefore, for ea...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید