Search

Your search keyword '"lightweight cryptography"' showing total 610 results

Search Constraints

Start Over You searched for: Descriptor "lightweight cryptography" Remove constraint Descriptor: "lightweight cryptography" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
610 results on '"lightweight cryptography"'

Search Results

1. A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box.

2. Enhancing Security and Power Efficiency of Ascon Hardware Implementation with STT-MRAM.

3. A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box

4. Performance-efficient flexible architecture of m–Crypton cipher for resource-constrained applications

5. In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes

6. Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations.

7. Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor.

8. Boomerang Attacks on Reduced-Round Midori64.

9. A Survey on Lightweight Cryptographic Algorithms in IoT

10. Quantum circuit implementations of lightweight authenticated encryption ASCON.

11. Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions.

12. Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher.

13. An ASCON AOP-SystemC Environment for Security Fault Analysis.

14. An Improved Lightning Search Algorithm-based End-to-End Lightweight Partially Homomorphic Encryption Approach for Enhanced IoT Security

15. CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors

16. MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks

17. TinyJAMBU Hardware Implementation for Low Power

18. Analysis of Lightweight Cryptographic Algorithms for IoT Gateways.

19. Optimizing implementations of linear layers using two and higher input XOR gates.

20. A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World.

21. Physical Unclonable Functions (PUF) for IoT Devices.

22. Permutation-Based Hashing Beyond the Birthday Bound

23. An efficient permutation approach for SbPN-based symmetric block ciphers

24. Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor

25. DRcipher: A pseudo-random dynamic round lightweight block cipher

26. Optimizing implementations of linear layers using two and higher input XOR gates

27. A practical key recovery attack on the lightweight WG-5 stream cipher

28. Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages

29. Tighter Trail Bounds for Xoodoo

30. A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers

31. An efficient permutation approach for SbPN-based symmetric block ciphers.

32. Secure Registration Protocol for the Internet of Drones Using Blockchain and Physical Unclonable Function Technology.

33. Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers.

34. IoT Edge Device Security: An Efficient Lightweight Authenticated Encryption Scheme Based on LED and PHOTON.

35. Modified Rijndael Algorithm for Resource-Constrained IoT-Based Wireless Sensor Networks.

36. A new hybrid method combining search and direct based construction ideas to generate all 4 ×4 involutory maximum distance separable (MDS) matrices over binary field extensions.

37. Lightweight Compression with Encryption Based on Asymmetric Numeral Systems

38. Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions

39. An ASCON AOP-SystemC Environment for Security Fault Analysis

40. A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions

41. The QARMAv2 Family of Tweakable Block Ciphers

42. Efficient and secure hybrid chaotic key generation for light encryption device block cipher.

43. Medical Image Encryption: A Comprehensive Review.

44. DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication.

45. High throughput compact area architecture of XXTEA for IoT application.

46. A Hardware Architecture of NIST Lightweight Cryptography Applied in IPSec to Secure High-Throughput Low-Latency IoT Networks

47. End-to-End Encryption in Resource-Constrained IoT Device

48. On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form

49. Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting

50. Software Implementation Solutions of A Lightweight Block Cipher to Secure Restricted IoT Environment: A Review

Catalog

Books, media, physical & digital resources