Search

Your search keyword '"lightweight cryptography"' showing total 1,121 results

Search Constraints

Start Over You searched for: Descriptor "lightweight cryptography" Remove constraint Descriptor: "lightweight cryptography"
1,121 results on '"lightweight cryptography"'

Search Results

1. A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box.

2. TLERAD: Transfer Learning for Enhanced Ransomware Attack Detection.

3. A Compressive Study on Security and Privacy Issues in IoT.

4. PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment.

5. Enhancing Security and Power Efficiency of Ascon Hardware Implementation with STT-MRAM.

6. A new S-box pattern generation based on chaotic enhanced logistic map: case of 5-bit S-box

7. Performance-efficient flexible architecture of m–Crypton cipher for resource-constrained applications

8. Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher.

9. A novel secured open standard framework for internet of things applications integrating elliptic curve cryptography and fog computing.

10. A Structured Lightweight Encryption Architecture for Data Protection in IoT.

11. Compact Walsh–Hadamard Transform-Driven S-Box Design for ASIC Implementations.

12. BLE-based secure tracking system proposal.

13. Performance Evaluation of Lightweight Stream Ciphers for Real-Time Video Feed Encryption on ARM Processor.

14. Lightweight Cryptography Based Secured Data Transmission Model for Quality of Service in Internet of Things-A Comparative Analysis.

15. Secure and lightweight message dissemination framework for internet of vehicles.

16. Boomerang Attacks on Reduced-Round Midori64.

17. ENHANCING SECURITY IN IOT DEVICES: A LIGHTWEIGHT HYBRID CRYPTOGRAPHIC SYSTEM (LCS) APPROACH.

18. Machine learning-based lightweight block ciphers for resource-constrained internet of things networks: a review.

19. OAE-RUP: A Strong Online AEAD Security Notion and Its Application to SAEF

20. DNA-Based Elliptic Curve Cryptography for Data Security in IoT

21. ASCON Lightweight Security Standard for the Internet of Things Devices—A Study

23. Tight Multi-user Security of Ascon and Its Large Key Extension

24. Analysis of Privacy Preservation on Mobile Ad-Hoc Networks

25. Construction of Lightweight Low-Latency Involutory MDS Matrices

27. A Lightweight Authenticated Key Agreement Scheme for Resource-Constrained Devices Based on Implicit Certificates and Finite Graphs

28. From Substitution Box to Threshold

29. Hybrid Lightweight Cryptography Using AES and ECC for IoT Security

30. A Lightweight Encryption Method for Preserving E-Healthcare Data Privacy Using Dual Signature on Twisted Edwards Curves

31. A Comparison of Lightweight Cryptographic Algorithms

32. A Survey on Lightweight Cryptographic Algorithms in IoT

33. A blockchain-based security system with light cryptography for user authentication security.

34. Quantum circuit implementations of lightweight authenticated encryption ASCON.

35. Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues.

36. Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions.

37. Modeling, hardware architecture, and performance analyses of an AEAD-based lightweight cipher.

38. An ASCON AOP-SystemC Environment for Security Fault Analysis.

39. An Improved Lightning Search Algorithm-based End-to-End Lightweight Partially Homomorphic Encryption Approach for Enhanced IoT Security

40. CrISA-X: Unleashing Performance Excellence in Lightweight Symmetric Cryptography for Extendable and Deeply Embedded Processors

41. MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks

42. TinyJAMBU Hardware Implementation for Low Power

44. Analysis of Lightweight Cryptographic Algorithms for IoT Gateways.

45. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions.

46. RAZOR: A Lightweight Block Cipher for Security in IoT.

47. Optimizing implementations of linear layers using two and higher input XOR gates.

48. A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World.

49. Physical Unclonable Functions (PUF) for IoT Devices.

50. DCC-128: a hardware-oriented lightweight chaotic stream cipher.

Catalog

Books, media, physical & digital resources