Search

Your search keyword '"Lightweight Cryptography"' showing total 1,102 results

Search Constraints

Start Over You searched for: Descriptor "Lightweight Cryptography" Remove constraint Descriptor: "Lightweight Cryptography"
1,102 results on '"Lightweight Cryptography"'

Search Results

1. A Compressive Study on Security and Privacy Issues in IoT.

2. Enhancing Security and Power Efficiency of Ascon Hardware Implementation with STT-MRAM.

3. Performance-efficient flexible architecture of m–Crypton cipher for resource-constrained applications

4. Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher.

5. A novel secured open standard framework for internet of things applications integrating elliptic curve cryptography and fog computing.

6. A Structured Lightweight Encryption Architecture for Data Protection in IoT.

7. Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations.

8. BLE-based secure tracking system proposal.

9. Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor.

10. Lightweight Cryptography Based Secured Data Transmission Model for Quality of Service in Internet of Things-A Comparative Analysis.

11. Secure and lightweight message dissemination framework for internet of vehicles.

12. Boomerang Attacks on Reduced-Round Midori64.

13. ENHANCING SECURITY IN IOT DEVICES: A LIGHTWEIGHT HYBRID CRYPTOGRAPHIC SYSTEM (LCS) APPROACH.

14. Machine learning-based lightweight block ciphers for resource-constrained internet of things networks: a review.

15. OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF

16. DNA-Based Elliptic Curve Cryptography for Data Security in IoT

17. ASCON Lightweight Security Standard for the Internet of Things Devices—A Study

19. Tight Multi-user Security of Ascon and Its Large Key Extension

20. Analysis of Privacy Preservation on Mobile Ad-Hoc Networks

21. Construction of Lightweight Low-Latency Involutory MDS Matrices

23. A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit Certificates and Finite Graphs

24. From Substitution Box to Threshold

25. Hybrid Lightweight Cryptography Using AES and ECC for IoT Security

26. A Lightweight Encryption Method for Preserving E-Healthcare Data Privacy Using Dual Signature on Twisted Edwards Curves

27. A Comparison of Lightweight Cryptographic Algorithms

28. A Survey on Lightweight Cryptographic Algorithms in IoT

29. A blockchain-based security system with light cryptography for user authentication security.

30. Quantum circuit implementations of lightweight authenticated encryption ASCON.

31. Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues.

32. Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions.

33. Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher.

34. An ASCON AOP-SystemC Environment for Security Fault Analysis.

35. An Improved Lightning Search Algorithm-based End-to-End Lightweight Partially Homomorphic Encryption Approach for Enhanced IoT Security

36. CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors

37. MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks

38. TinyJAMBU Hardware Implementation for Low Power

39. Analysis of Lightweight Cryptographic Algorithms for IoT Gateways.

40. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions.

41. RAZOR: A Lightweight Block Cipher for Security in IoT.

42. Optimizing implementations of linear layers using two and higher input XOR gates.

43. A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World.

44. Physical Unclonable Functions (PUF) for IoT Devices.

45. DCC-128: a hardware-oriented lightweight chaotic stream cipher.

46. Permutation-Based Hashing Beyond the Birthday Bound

47. An efficient permutation approach for SbPN-based symmetric block ciphers

48. Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor

49. Exact Security Analysis of ASCON

50. FPGA Implementation of SLIM an Ultra-Lightweight Block Cipher for IoT Applications

Catalog

Books, media, physical & digital resources