Gotowa bibliografia na temat „Lightweight Encryption Cipher”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Lightweight Encryption Cipher”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Lightweight Encryption Cipher"

1

Mishra, Girish, S. K. Pal, S. V. S. S. N. V. G. Krishna Murthy, Kanishk Vats, and Rakshak Raina. "Distinguishing Lightweight Block Ciphers in Encrypted Images." Defence Science Journal 71, no. 5 (2021): 647–55. http://dx.doi.org/10.14429/dsj.71.16843.

Pełny tekst źródła
Streszczenie:
Modern day lightweight block ciphers provide powerful encryption methods for securing IoT communication data. Tiny digital devices exchange private data which the individual users might not be willing to get disclosed. On the other hand, the adversaries try their level best to capture this private data. The first step towards this is to identify the encryption scheme. This work is an effort to construct a distinguisher to identify the cipher used in encrypting the traffic data. We try to establish a deep learning based method to identify the encryption scheme used from a set of three lightweig
Style APA, Harvard, Vancouver, ISO itp.
2

Matheis, Kenneth, Rainer Steinwandt, and Adriana Suárez Suárez Corona. "Algebraic Properties of the Block Cipher DESL." Symmetry 11, no. 11 (2019): 1411. http://dx.doi.org/10.3390/sym11111411.

Pełny tekst źródła
Streszczenie:
The Data Encryption Standard Lightweight extension (DESL) is a lightweight block cipher which is very similar to DES, but unlike DES uses only a single S-box. This work demonstrates that this block cipher satisfies comparable algebraic properties to DES—namely, the round functions of DESL generate the alternating group and both ciphers resist multiple right-hand sides attacks.
Style APA, Harvard, Vancouver, ISO itp.
3

Kim, Hyunjun, Siwoo Eum, Wai-Kong Lee, Sokjoon Lee, and Hwajeong Seo. "Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU." Applied Sciences 12, no. 20 (2022): 10192. http://dx.doi.org/10.3390/app122010192.

Pełny tekst źródła
Streszczenie:
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of data are being created and communicated in IoT networks. Block ciphers are being used to protect these data from malicious attacks. Massive computation overheads introduced by bulk encryption using block ciphers can become a performance bottleneck of the server, requiring high throughput. As the need for high-speed encryption required for such communications has emerged, research is underway to utilize a graphics processor for encryption processing based on the high processing power of the GPU. Ap
Style APA, Harvard, Vancouver, ISO itp.
4

Sayyed, Karishma Shaukat, Prof S. R. Ganolkar, and Prof S. O. Rajankar. "FPGA Implementation of Rectangle Lightweight Block Cipher." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 2426–33. http://dx.doi.org/10.22214/ijraset.2022.42143.

Pełny tekst źródła
Streszczenie:
Abstract: Block ciphers are basic building blocks for network security. In recent years, designing a lightweight block cipher is the main goal of VLSI design engineers. In this paper, we have designed and verified the functionality of the RECTANGLE block cipher which is one of the lightweight block cipher using Modelsim simulator and implemented using Intel Quartus Prime 18.0 FPGA device. Using the bit-slice technique a RECTANGLE block cipher allows lightweight and fast implementations. The en-cryption architecture has two parts one is round transformation and the other is key scheduling. RECT
Style APA, Harvard, Vancouver, ISO itp.
5

Zakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria, and Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application." Symmetry 14, no. 10 (2022): 2042. http://dx.doi.org/10.3390/sym14102042.

Pełny tekst źródła
Streszczenie:
Data transmissions between smartphone users require security solutions to protect communications. Hence, encryption is an important tool that must be associated with smartphones to keep the user’s data safe. One proven solution to enhance the security of encryption algorithms is by using 3D designs on symmetric block ciphers. Although a 3D cipher design could improve the algorithms, the existing methods enlarge the block sizes that will also expand the key sizes and encryption rounds, thus decreasing their efficiency. Therefore, we propose the LAO-3D block cipher using a 3D permutation that of
Style APA, Harvard, Vancouver, ISO itp.
6

Wang, Juan, and Qun Ding. "Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction." Entropy 20, no. 9 (2018): 693. http://dx.doi.org/10.3390/e20090693.

Pełny tekst źródła
Streszczenie:
According to the keyword abstract extraction function in the Natural Language Processing and Information Retrieval Sharing Platform (NLPIR), the design method of a dynamic rounds chaotic block cipher is presented in this paper, which takes into account both the security and efficiency. The cipher combines chaotic theory with the Feistel structure block cipher, and uses the randomness of chaotic sequence and the nonlinearity of chaotic S-box to dynamically generate encrypted rounds, realizing more numbers of dynamic rounds encryption for the important information marked by NLPIR, while less num
Style APA, Harvard, Vancouver, ISO itp.
7

Antal, Eugen, and Viliam Hromada. "A NEW STREAM CIPHER BASED ON FIALKA M-125." Tatra Mountains Mathematical Publications 57, no. 1 (2013): 101–18. http://dx.doi.org/10.2478/tmmp-2013-0038.

Pełny tekst źródła
Streszczenie:
ABSTRACT In 2010, a new cipher Hummingbird by [Engels, D.-Fan, X.- -Gong, G.-Hu, H.-Smith, E. M. Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices, in: 1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices. Tenerife, Canary Islands, Spain, January 2010] was proposed. It is a combination of both block and stream cipher and its design was inspired and motivated by the Enigma machine. The encryption process of the cipher can be considered as a continuous running of a rotor-cipher. Four block ciphers play the role of the rotors that appl
Style APA, Harvard, Vancouver, ISO itp.
8

Zhang, Ping, and Qian Yuan. "Minimizing Key Materials: The Even–Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption." Security and Communication Networks 2020 (March 10, 2020): 1–6. http://dx.doi.org/10.1155/2020/4180139.

Pełny tekst źródła
Streszczenie:
The Even–Mansour cipher has been widely used in block ciphers and lightweight symmetric-key ciphers because of its simple structure and strict provable security. Its research has been a hot topic in cryptography. This paper focuses on the problem to minimize the key material of the Even–Mansour cipher while its security bound remains essentially the same. We introduce four structures of the Even–Mansour cipher with a short key and derive their security by Patarin’s H-coefficients technique. These four structures are proven secure up to O˜2k/μ adversarial queries, where k is the bit length of t
Style APA, Harvard, Vancouver, ISO itp.
9

Fan, Ting, Lingchen Li, Yongzhuang Wei, and Enes Pasalic. "Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher." International Journal of Distributed Sensor Networks 18, no. 9 (2022): 155013292211193. http://dx.doi.org/10.1177/15501329221119398.

Pełny tekst źródła
Streszczenie:
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission. Differential cryptanalysis is one of the most fundamental methods applicable primarily to block ciphers, and the resistance against this type of cryptanalysis is a necessary design criterion. ANU-II is an ultra-lightweight block cipher proposed in 2017, whose design offers many advantages such as the use of fewer hardware resources (logic gates), low power consumption and fast encryption for I
Style APA, Harvard, Vancouver, ISO itp.
10

Al-Omari, A. H. "Lightweight Dynamic Crypto Algorithm for Next Internet Generation." Engineering, Technology & Applied Science Research 9, no. 3 (2019): 4203–8. http://dx.doi.org/10.48084/etasr.2743.

Pełny tekst źródła
Streszczenie:
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmission which usually conflicts with the necessary requirements of confidential and secure transmission. In this work, a relatively fast, lightweight and attack-resistant crypto algorithm is proposed. The algorithm is a symmetric block cipher that uses a secure pre-shared secret as the first step. Then, a dynamic length key is generated and inserted inside the cipher text. Upon receiving the cipher text, the receiver extracts the key from the received cipher text to decrypt the message. In this al
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!