Search

Your search keyword '"Lightweight Cryptography"' showing total 323 results

Search Constraints

Start Over You searched for: Descriptor "Lightweight Cryptography" Remove constraint Descriptor: "Lightweight Cryptography" Database OpenAIRE Remove constraint Database: OpenAIRE
323 results on '"Lightweight Cryptography"'

Search Results

1. Indifferentiability of the Sponge Construction with a Restricted Number of Message Blocks

2. Practical Cube Attack against Nonce-Misused Ascon

3. RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography

4. Throwing Boomerangs into Feistel Structures

5. Архітектура гнучко конфігурованих периферійних модулів на базі програмованих процесорних ядер

6. Benchmarking of lightweight cryptographic algorithms for wireless IoT networks

7. РЕАЛІЗАЦІЯ МЕТОДУ СИНТЕЗУ ГРУП СИМЕТРИЧНИХ ДВОХОПЕРАНДНИХ ОПЕРАЦІЙ КРИПТОГРАФІЧНОГО КОДУВАННЯ ІНФОРМАЦІЇ ДЛЯ СИСТЕМ БЛОКОВОГО ШИФРУВАННЯ

8. More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs

9. DRACO Stream Cipher

10. A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity

11. Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform

12. Security analysis of NIST-LWC contest finalists

13. An Enhanced Energy Efficient Lightweight Cryptography Method for various IoT devices

14. Security Analysis of Improved EDHOC Protocol

15. On the Lower Bound of Cost of MDS Matrices

16. Lightweight Permutation-Based Cryptography for the Ultra-Low-Power Internet of Things

17. Sycon: a new milestone in designing ASCON-like permutations

18. Data Protection Mechanisms in IoT: A Vital Challenge

19. Secured Model for Internet of Things (IoT) to Monitor Smart Field Data with Integrated Real-Time Cloud Using Lightweight Cryptography

20. Lightweight Cryptography Algorithms for IOT Devices

21. A lightweight cryptographic solution to secure digital transmissions on resource-constrained environments

22. Six shades lighter: a bit-serial implementation of the AES family

23. A performance comparison of lightweight cryptographic algorithms suitable for IoT transmissions

24. Definition of a lightweight cryptographic solution to secure health data on IoT and cloud

25. An Area-Optimized and Power-Efficient CBC-PRESENT and HMAC-PHOTON

26. Integral Cryptanalysis of WARP based on Monomial Prediction

27. Lightweight Stream Ciphers based on Chaos for Time and Energy Constrained IoT Applications

28. Orthros: A Low-Latency PRF

29. Design of an SoC Based on 32-Bit RISC-V Processor with Low-Latency Lightweight Cryptographic Cores in FPGA

30. Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

31. Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes

32. An Efficient, Hybrid Authentication Using ECG and Lightweight Cryptographic Scheme for WBAN

33. Lightweight, Single-Clock-Cycle, Multilayer Cipher for Single-Channel IoT Communication: Design and Implementation

34. A Flexible Gimli Hardware Implementation in FPGA and Its Application to RFID Authentication Protocols

35. A Three-Tier Approach for Lightweight Data Security of Body Area Networks in E-Health Applications

36. Recent Security Trends in Internet of Things: A Comprehensive Survey

37. A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers

38. Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors

39. Towards Low-Latency Implementation of Linear Layers

40. Security Threats and Cryptographic Protocols for Medical Wearables

41. A Lightweight System-On-Chip Based Cryptographic Core for Low-Cost Devices

42. Lightweight Cryptography Algorithms for IoT Resource‐Starving Devices

43. Low‐cost and two‐cycle hardware structures of PRINCE lightweight block cipher

44. A survey on implementation of lightweight block ciphers for resource constraints devices

45. Xoodyak, a lightweight cryptographic scheme

46. A Lightweight Cryptography Algorithm for Secure Smart Cities and IOT

47. Lightweighted Secure Searching Over Public-Key Ciphertexts for Edge-Cloud-Assisted Industrial IoT Devices

48. Low AND Depth and Efficient Inverses: a Guide on S-boxes for Low-latency Masking

49. Comparison of scalar point multiplication algorithms in a low resource device

50. Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak

Catalog

Books, media, physical & digital resources