Search

Your search keyword '"lightweight cryptography"' showing total 1,121 results

Search Constraints

Start Over You searched for: Descriptor "lightweight cryptography" Remove constraint Descriptor: "lightweight cryptography"
1,121 results on '"lightweight cryptography"'

Search Results

201. I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context

202. IoT Security: A Comprehensive View

204. An Area-Optimized Architecture for LiCi Cipher

205. ECC Based Encryption Algorithm for Lightweight Cryptography

206. LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX

207. Assembly or Optimized C for Lightweight Cryptography on RISC-V?

208. Energy Analysis of Lightweight AEAD Circuits

209. Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT

210. A Hardware in the Loop Benchmark Suite to Evaluate NIST LWC Ciphers on Microcontrollers

211. On the Design of Bit Permutation Based Ciphers : The Interplay Among S-Box, Bit Permutation and Key-Addition

212. U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme

213. FELICS-AEAD: Benchmarking of Lightweight Authenticated Encryption Algorithms

214. Lightweight MACs from Universal Hash Functions

215. A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things

216. Tight Security Bounds for Generic Stream Cipher Constructions

218. RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography

219. Throwing Boomerangs into Feistel Structures

220. Software Implementation and Benchmarking of TinyJAMBU on Programmable Logic Controllers.

221. Provable security against generic attacks on stream ciphers

223. A survey on implementation of lightweight block ciphers for resource constraints devices.

224. An Area-Optimized and Power-Efficient CBC-PRESENT and HMAC-PHOTON.

225. Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages.

226. Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors.

227. Lightweight ANU-II block cipher on field programmable gate array.

228. Improved fault analysis on SIMECK ciphers.

229. Breaking Masked Implementations of the Clyde-Cipher by Means of Side-Channel Analysis

230. IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS

231. More Inputs Makes Difference: Implementations of Linear Layers Using Gates with More Than Two Inputs

232. The DRACO Stream Cipher

233. Integral Cryptanalysis of WARP based on Monomial Prediction

234. Design of an SoC Based on 32-Bit RISC-V Processor with Low-Latency Lightweight Cryptographic Cores in FPGA

235. A Multi-Key with Partially Homomorphic Encryption Scheme for Low-End Devices Ensuring Data Integrity

236. An STP-based model toward designing S-boxes with good cryptographic properties.

237. Cryptanalysis of the AEAD and hash algorithm DryGASCON.

238. A Lightweight System-On-Chip Based Cryptographic Core for Low-Cost Devices.

239. New and Efficient Lightweight Cryptography Algorithm for Mobile and Web Applications.

240. Security Threats and Cryptographic Protocols for Medical Wearables.

241. A Lightweight Image Encryption Algorithm for Secure Communications in Multimedia Internet of Things.

242. Study on Approaches for Geospatial Data Security.

243. Performance Evaluation of Lightweight Cryptographic Algorithms for Heterogeneous IoT Environment.

244. A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure

245. A VLSI Architecture for the PRESENT Block Cipher with FPGA and ASIC Implementations

246. Design of Cryptographic Core for Protecting Low Cost IoT Devices

247. Optimal Lightweight Cryptography Algorithm for Environmental Monitoring Service Based on IoT

248. A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT

Catalog

Books, media, physical & digital resources