Gotowa bibliografia na temat „Lightweight Encryption Algorithm”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Lightweight Encryption Algorithm”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Lightweight Encryption Algorithm"
Nyssanbayeva, Saule, Nursulu Kapalova, Armiyanbek Haumen i Olzhas Suleimenov. "The LBC-3 lightweight encryption algorithm". Open Engineering 12, nr 1 (1.01.2022): 570–77. http://dx.doi.org/10.1515/eng-2022-0372.
Pełny tekst źródłaAbdul Hussien, Farah Tawfiq, Abdul Monem S. Rahma i Hala Bahjat Abdul Wahab. "A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites". Security and Communication Networks 2021 (24.12.2021): 1–15. http://dx.doi.org/10.1155/2021/9961172.
Pełny tekst źródłaDunmore, Aeryn, Juliet Samandari i Julian Jang-Jaccard. "Matrix Encryption Walks for Lightweight Cryptography". Cryptography 7, nr 3 (16.08.2023): 41. http://dx.doi.org/10.3390/cryptography7030041.
Pełny tekst źródłaCherckesova, Larissa, Olga Safaryan, Pavel Razumov, Dmitry Medvedev, Veronica Kravchenko i Yuriy Ivanov. "Analysis of block encryption algorithms being used in devices with restricted amount of technological possibilities". E3S Web of Conferences 224 (2020): 01043. http://dx.doi.org/10.1051/e3sconf/202022401043.
Pełny tekst źródłaZhang, Xing, Jian Chen, Tianning Li, Gang Dai i Changda Wang. "LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages". Symmetry 15, nr 1 (7.01.2023): 177. http://dx.doi.org/10.3390/sym15010177.
Pełny tekst źródłaKapalova, Nursulu, Kunbolat Algazy i Armanbek Haumen. "Development of a new lightweight encryption algorithm". Eastern-European Journal of Enterprise Technologies 3, nr 9 (123) (30.06.2023): 6–19. http://dx.doi.org/10.15587/1729-4061.2023.280055.
Pełny tekst źródłaBahrami, Saeed, i Majid Naderi. "Image Encryption Using a Lightweight Stream Encryption Algorithm". Advances in Multimedia 2012 (2012): 1–8. http://dx.doi.org/10.1155/2012/767364.
Pełny tekst źródłaFadhil, Heba Mohammed, Mohamed Elhoseny i Baydaa M. Mushgil. "Protecting Medical Data on the Internet of Things with an Integrated Chaotic-GIFT Lightweight Encryption Algorithm". Journal of Cybersecurity and Information Management 12, nr 1 (2023): 50–66. http://dx.doi.org/10.54216/jcim.120105.
Pełny tekst źródłaTong, Xiaojun, Xudong Liu, Jing Liu, Miao Zhang i Zhu Wang. "A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box". International Journal of Bifurcation and Chaos 31, nr 10 (sierpień 2021): 2150152. http://dx.doi.org/10.1142/s0218127421501522.
Pełny tekst źródłaAbdalrazzaq, Alaa, i Salah Alabady. "Design and Implementation of a Lightweight and Fast Tiny Advanced Encryption Standard Algorithm". Jordan Journal of Electrical Engineering 8, nr 4 (2022): 339. http://dx.doi.org/10.5455/jjee.204-1658696772.
Pełny tekst źródłaRozprawy doktorskie na temat "Lightweight Encryption Algorithm"
Sleem, Lama. "Design and implementation of lightweight and secure cryptographic algorithms for embedded devices". Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD018.
Pełny tekst źródłaLiving in an era where new devices are astonishing considering their high capabilities, new visions and terms have emerged. Moving to smart phones, Wireless Sensor Networks, high-resolution cameras, pads and much more, has mandated the need to rethink the technological strategy that is used today. Starting from social media, where apparently everything is being exposed, moving to highly powerful surveillance cameras, in addition to real time health monitoring, it can be seen that a high amount of data is being stored in the Cloud and servers. This introduced a great challenge for their storage and transmission especially in the limited resourced platforms that are characterized by: (a) limited computing capabilities, (b) limited energy and source of power and (c) open infrastructures that transmit data over wireless unreliable networks. One of the extensively studied platforms is the Vehicular Ad-hoc Networks which tends to have many limitations concerning the security field. In this dissertation, we focus on improving the security of transmitted multimedia contents in different limited platforms, while preserving a high security level. Limitations of these platforms are taken into consideration while enhancing the execution time of the secure cipher. Additionally, if the proposed cipher is to be used for images, the intrinsic voluminous and complex nature of the managed images is also taken into account. In the first part, we surveyed one of the limited platforms that is interesting for many researchers, which is the Vehicular Ad-hoc Networks. In order to pave the way for researchers to find new efficient security solutions, it is important to have one reference that can sum most of the recent works. It almost investigates every aspect in this field shedding the light over different aspects this platform possesses. Then, in order to propose any new security solution and validate its robustness and the level of randomness of the ciphered image, a simple and efficient test is proposed. This test proposes using the randomness tools, TestU01 and Practrand, in order to assure a high level of randomness. After running these tests on well known ciphers, some flaws were exposed. Proceeding to the next part, a novel proposal for enhancing the well-known ultra lightweight cipher scheme, Speck, is proposed. The main contribution of this work is to obtain a better version compared to Speck. In this proposal, 26 rounds in Speck were reduced to 7 rounds in Speck-R while enhancing the execution time by at least 50%. First, we validate that Speck-R meets the randomness tests that are previously proposed. Additionally, a dynamic substitution layer adds more security against key related attacks and highly fortifies the cipher. Speck-R was implemented on different limited arduino chips and in all cases, Speck-R was ahead of Speck. Then, in order to prove that this cipher can be used for securing images, especially in VANETS/IoV, where images can be extensively re/transmitted, several tests were exerted and results showed that Speck-R indeed possesses the high level of security desired in any trusted cipher. Extensive experiments validate our proposal from both security and performance point of views and demonstrate the robustness of the proposed scheme against the most-known types of attacks
Hazzaa, Firas. "A new security scheme and lightweight encryption algorithm for voice over wireless networks connectivity to Internet". Thesis, 2019. https://arro.anglia.ac.uk/id/eprint/705272/1/Hazzaa_2019.pdf.
Pełny tekst źródłaDatta, Nivedita. "Study and Design of Energy Efficient Block Cipher for Wireless Body Area Networks (WBANs)". Thesis, 2014. http://etd.iisc.ac.in/handle/2005/4109.
Pełny tekst źródłaYekkala, Anil Kumar. "Analysis And Design Of Image And Video Encryption Algorithms". Thesis, 2006. https://etd.iisc.ac.in/handle/2005/436.
Pełny tekst źródłaYekkala, Anil Kumar. "Analysis And Design Of Image And Video Encryption Algorithms". Thesis, 2006. http://hdl.handle.net/2005/436.
Pełny tekst źródłaCzęści książek na temat "Lightweight Encryption Algorithm"
Chen, Zhen. "A Lightweight Encryption Algorithm for Images". W Advances in Intelligent and Soft Computing, 235–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27866-2_29.
Pełny tekst źródłaBanerjee, Soumi, i Anita Patil. "ECC Based Encryption Algorithm for Lightweight Cryptography". W Advances in Intelligent Systems and Computing, 600–609. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16657-1_56.
Pełny tekst źródłaEngels, Daniel, Markku-Juhani O. Saarinen, Peter Schweitzer i Eric M. Smith. "The Hummingbird-2 Lightweight Authenticated Encryption Algorithm". W RFID. Security and Privacy, 19–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25286-0_2.
Pełny tekst źródłaQin, Yiming, Xinchun Cui, Yuefan Wang, Hong Qiao i Shancang Li. "Lightweight Encryption Algorithm Containing SPN Structure for IoT". W Cyberspace Safety and Security, 253–62. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_22.
Pełny tekst źródłaLiu, Zheng, Xue Li i Zhaoyang Dong. "A Lightweight Encryption Algorithm for Mobile Online Multimedia Devices". W Web Information Systems – WISE 2004, 653–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30480-7_67.
Pełny tekst źródłaAl-Attab, Basel Saleh, H. S. Fadewar i Mahmoud E. Hodeish. "Lightweight Effective Encryption Algorithm for Securing Data in Cloud Computing". W Advances in Intelligent Systems and Computing, 105–21. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1513-8_13.
Pełny tekst źródłaVan Nguyen, Ha, Hwajeong Seo i Howon Kim. "Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA". W Future Data and Security Engineering, 191–203. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12778-1_15.
Pełny tekst źródłaNayak, Manoja Kumar, Dinesh Kumar Dash, Prasanta Kumar Swain i Abhimanyu Sahu. "Video Encryption Using Optimization Lightweight Algorithm for Secure Internet of Things". W Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023, 331–41. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3878-0_28.
Pełny tekst źródłaVan Tanh, Nguyen, Ngo Quang Tri, Nguyen Linh Giang i Duy-Tien Le. "Security Solution for the Internet of Things with the Innovative Lightweight Encryption Algorithm CurveCP". W Advances in Intelligent Systems and Computing, 503–13. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-4369-9_49.
Pełny tekst źródłaHariprasad, S., T. Deepa i N. Bharathiraja. "HLWEA-IOT: Hybrid Lightweight Encryption Algorithm Based Secure Data Transmission in IoT-MQTT Networks". W Intelligent Cyber Physical Systems and Internet of Things, 813–23. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-18497-0_59.
Pełny tekst źródłaStreszczenia konferencji na temat "Lightweight Encryption Algorithm"
Jha, Pallavi, Haythem Yosef Zorkta, Dahham Allawi i Maher Riad Al-Nakkar. "Improved Lightweight Encryption Algorithm (ILEA)". W 2020 International Conference for Emerging Technology (INCET). IEEE, 2020. http://dx.doi.org/10.1109/incet49848.2020.9154170.
Pełny tekst źródłaHussain, Syed Saiq, Muhammad Sohail Ibrahim, Syed Zain Mir, Sajid Yasin, Muhammad Kashif Majeed i Azfar Ghani. "Efficient Video Encryption using Lightweight Cryptography Algorithm". W 2018 3rd International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST). IEEE, 2018. http://dx.doi.org/10.1109/iceest.2018.8643317.
Pełny tekst źródłaCao, Wenhua, Shuqin Geng, Xiaohong Peng, Jingyao Nie, Xuefeng Li i Pengkun Li. "A Lightweight Encryption Algorithm for RFID System". W 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA). IEEE, 2022. http://dx.doi.org/10.1109/cvidliccea56201.2022.9824845.
Pełny tekst źródłaAboshosha, Bassam W., Rabie A. Ramdan i Abdel Moneim Wahdan. "Lightweight Cryptographic Algorithm : Variable Key Length Encryption Algorithm (VEA)". W 2014 24th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2014. http://dx.doi.org/10.1109/iccta35431.2014.9521620.
Pełny tekst źródłaLi-feng, Wang, Niu Jian-wei, Ma Jian, Wang Wen-dong i Xiao Chen. "A Lightweight Video Encryption Algorithm for Wireless Application". W 2008 Fifth IEEE International Symposium on Embedded Computing (SEC 2008). IEEE, 2008. http://dx.doi.org/10.1109/sec.2008.68.
Pełny tekst źródłaChandrashekhar, RV, J. Visumathi i A. PeterSoosai Anandaraj. "Advanced Lightweight Encryption Algorithm for Android (IoT) Devices". W 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI). IEEE, 2022. http://dx.doi.org/10.1109/accai53970.2022.9752555.
Pełny tekst źródłaWang, Rining, GuangMing Guo, ZhiGang Wang, ZiJian Meng, JinAn Li i JinShuai Wang. "Research on lightweight encryption algorithm for IoT devices". W International Conference on Signal Processing and Communication Security (ICSPCS 2022), redaktorzy Min Xiao i Lisu Yu. SPIE, 2022. http://dx.doi.org/10.1117/12.2655337.
Pełny tekst źródłaHussain Pirzada, Syed Jahanzeb, Tongge Xu i Liu Jianwei. "Lightweight Encryption Algorithm Implementation for Internet of Thing Application". W 2020 International Conference on Cyber Warfare and Security (ICCWS). IEEE, 2020. http://dx.doi.org/10.1109/iccws48432.2020.9292373.
Pełny tekst źródłaLian, Shiguo, Yingjun Cao, Jinsheng Sun i Zhiquan Wang. "Lightweight MPEG4 video encryption algorithm suitable for network transmission". W Optics East, redaktorzy Chang Wen Chen, C. C. Jay Kuo i Anthony Vetro. SPIE, 2004. http://dx.doi.org/10.1117/12.570742.
Pełny tekst źródłaWang, Hongbo, Haoran Zheng, Bin Hu i Hongwu Tang. "Improved Lightweight Encryption Algorithm Based on Optimized S-Box". W 2013 Fifth International Conference on Computational and Information Sciences (ICCIS). IEEE, 2013. http://dx.doi.org/10.1109/iccis.2013.198.
Pełny tekst źródła