نتایج جستجو برای: lightweight cryptography

تعداد نتایج: 58663  

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2020

Journal: :Electronics 2022

The security of resource-constrained devices is critical in the IoT field, given that everything interconnected. Therefore, National Institute Standards and Technology (NIST) initialized lightweight cryptography (LWC) project to standardize algorithms for devices. After two rounds, NIST announced finalists 2021. finalist are Ascon, Elephant, GIFT-COFB, Grain-128AEAD, ISAP, PHOTON-Beetle, Romulu...

Journal: :Electronics 2022

Unmanned aerial vehicles (UAVs) (also known as drones) are aircraft that do not require the presence of a human pilot to fly. UAVs can be controlled remotely by operator or autonomously onboard computer systems. have many military uses, including battlefield surveillance, effective target tracking and engagement in air-to-ground warfare, situational awareness challenging circumstances. They als...

Journal: :Eurasip Journal on Wireless Communications and Networking 2021

Abstract In order to solve the problem between low power of Internet Things devices and high cost cryptography, lightweight cryptography is required. The improvement scalar multiplication can effectively reduce complexity elliptic curve (ECC). this paper, we propose a fast formula for point septupling on curves over binary fields using division polynomial multiplexing intermediate values accele...

Journal: :Electronics 2023

Lightweight cryptography is implemented in unrolled architecture generally, which has the characteristics of low latency and high real-time performance but also faces threat Side-Channel Attack (SCA). Different from traditional loop architecture, requires separate protection against SCA each round. This leads to that very sensitive number rounds need be protected SCA. In this paper, we propose ...

Journal: :Iet Computers and Digital Techniques 2023

The protection of communications between Internet Things (IoT) devices is great concern because the information exchanged contains vital sensitive data. Malicious agents seek to exploit those data extract secret about owners or system. Power side channel attacks are on these their power consumption unintentionally leaks correlatable device's Several studies have demonstrated effectiveness authe...

2013
Ying Li Ping Du

In order to improve the security of information transmitted in the internet of things, this study designs an information security system architecture of internet of things based on a lightweight cryptography. In this security system, an authentication protocol, encryption/decryption protocol and signature verification protocol are proposed and implemented. All these security protocol are used t...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

Cryptography algorithms are a fundamental part of cryptographic system that is designed and implemented to increase information security. They the center attention experts in technology domains. Although cryptography attainthe goals such as confidentially, integrity authenticity designing, but other matters must be noticed by designers include speed, resource consumption, reliability, flexibili...

Journal: :alexandria engineering journal 2021

The extensive networking of devices and the large amount data generated from Internet Things (IoT) has brought security issues to attention researcher. Java is most common platform for embedded applications such as IoT, Wireless Sensors Networks (WSN), Near Field Communications (NFC) Radio Frequency Identification (RFID). object programming languages Java, SWIFT, PHP C++ use garbage collection ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید