Gotowa bibliografia na temat „Lightweight Encryption Cipher”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Lightweight Encryption Cipher”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Lightweight Encryption Cipher"
Mishra, Girish, S. K. Pal, S. V. S. S. N. V. G. Krishna Murthy, Kanishk Vats i Rakshak Raina. "Distinguishing Lightweight Block Ciphers in Encrypted Images". Defence Science Journal 71, nr 5 (2.09.2021): 647–55. http://dx.doi.org/10.14429/dsj.71.16843.
Pełny tekst źródłaMatheis, Kenneth, Rainer Steinwandt i Adriana Suárez Suárez Corona. "Algebraic Properties of the Block Cipher DESL". Symmetry 11, nr 11 (15.11.2019): 1411. http://dx.doi.org/10.3390/sym11111411.
Pełny tekst źródłaKim, Hyunjun, Siwoo Eum, Wai-Kong Lee, Sokjoon Lee i Hwajeong Seo. "Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU". Applied Sciences 12, nr 20 (11.10.2022): 10192. http://dx.doi.org/10.3390/app122010192.
Pełny tekst źródłaSayyed, Karishma Shaukat, Prof S. R. Ganolkar i Prof S. O. Rajankar. "FPGA Implementation of Rectangle Lightweight Block Cipher". International Journal for Research in Applied Science and Engineering Technology 10, nr 5 (31.05.2022): 2426–33. http://dx.doi.org/10.22214/ijraset.2022.42143.
Pełny tekst źródłaZakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria i Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application". Symmetry 14, nr 10 (30.09.2022): 2042. http://dx.doi.org/10.3390/sym14102042.
Pełny tekst źródłaWang, Juan, i Qun Ding. "Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction". Entropy 20, nr 9 (11.09.2018): 693. http://dx.doi.org/10.3390/e20090693.
Pełny tekst źródłaAntal, Eugen, i Viliam Hromada. "A NEW STREAM CIPHER BASED ON FIALKA M-125". Tatra Mountains Mathematical Publications 57, nr 1 (1.11.2013): 101–18. http://dx.doi.org/10.2478/tmmp-2013-0038.
Pełny tekst źródłaZhang, Ping, i Qian Yuan. "Minimizing Key Materials: The Even–Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption". Security and Communication Networks 2020 (10.03.2020): 1–6. http://dx.doi.org/10.1155/2020/4180139.
Pełny tekst źródłaFan, Ting, Lingchen Li, Yongzhuang Wei i Enes Pasalic. "Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher". International Journal of Distributed Sensor Networks 18, nr 9 (wrzesień 2022): 155013292211193. http://dx.doi.org/10.1177/15501329221119398.
Pełny tekst źródłaAl-Omari, A. H. "Lightweight Dynamic Crypto Algorithm for Next Internet Generation". Engineering, Technology & Applied Science Research 9, nr 3 (8.06.2019): 4203–8. http://dx.doi.org/10.48084/etasr.2743.
Pełny tekst źródłaRozprawy doktorskie na temat "Lightweight Encryption Cipher"
Jeddi, Zahra. "A Lightweight Authenticated Symmetric Encryption Cipher for RFID Systems". Thesis, University of Louisiana at Lafayette, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3687692.
Pełny tekst źródłaRadio Frequency Identification, RFID, is a type of automatic identification system which has gained popularity in recent years for being fast and reliable in keeping track of individual objects. Due to limited available resources in RFID tags, providing privacy and security for RFID systems is one of the important challenges nowadays. In this dissertation, a lightweight symmetric encryption algorithm called RBS, Redundant Bit Security, is presented which is suitable for resource constrained applications like RFID systems. Confidentiality of the plaintext in this algorithm is achieved through inserting some redundant bits inside the plaintext bits where the location of redundant bits inside the ciphertext is the secret key shared between sender and receiver. Besides confidentiality, these redundant bits are calculated in such a way that they provide authentication and integrity as well. The security of the algorithm is analyzed against some well-known attacks such as known plaintext, known ciphertext, chosen plaintext, and differential attacks. Experimental and simulation results confirm that RBS implementation requires less power and area overhead compared to other known symmetric algorithms proposed for RFID systems, especially when the authentication is essential like in harsh environments.
Datta, Nivedita. "Study and Design of Energy Efficient Block Cipher for Wireless Body Area Networks (WBANs)". Thesis, 2014. http://etd.iisc.ac.in/handle/2005/4109.
Pełny tekst źródłaCzęści książek na temat "Lightweight Encryption Cipher"
Billet, Olivier, Jonathan Etrog i Henri Gilbert. "Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher". W Fast Software Encryption, 55–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13858-4_4.
Pełny tekst źródłaPosteuca, Raluca, i Vincent Rijmen. "RAMus- A New Lightweight Block Cipher for RAM Encryption". W Lecture Notes in Computer Science, 69–92. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-14791-3_4.
Pełny tekst źródłaSingh, Yumnam Kirani. "A Lightweight Exchangeable Encryption Scheme for IoT Devices Based on Vigenere Cipher and MLS Keystream". W Lecture Notes in Electrical Engineering, 165–80. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-7804-5_13.
Pełny tekst źródłaLuykx, Atul, Bart Preneel, Elmar Tischhauser i Kan Yasuda. "A MAC Mode for Lightweight Block Ciphers". W Fast Software Encryption, 43–59. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-52993-5_3.
Pełny tekst źródłaArmknecht, Frederik, i Vasily Mikhalev. "On Lightweight Stream Ciphers with Shorter Internal States". W Fast Software Encryption, 451–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48116-5_22.
Pełny tekst źródłaKhairallah, Mustafa. "Analysis of Lightweight BC-Based AEAD". W Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers, 93–114. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6344-4_5.
Pełny tekst źródłaKhairallah, Mustafa. "Hardware Design Space Exploration of a Selection of NIST Lightweight Cryptography Candidates". W Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers, 161–90. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6344-4_8.
Pełny tekst źródłaDweik, Haneen, i Mohammad Abutaha. "A Survey of Lightweight Image Encryption for IoT". W Lightweight Cryptographic Techniques and Cybersecurity Approaches [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.104431.
Pełny tekst źródłaStreszczenia konferencji na temat "Lightweight Encryption Cipher"
Luo, Yiyuan, Qi Chai, Guang Gong i Xuejia Lai. "A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication". W GLOBECOM 2010 - 2010 IEEE Global Communications Conference. IEEE, 2010. http://dx.doi.org/10.1109/glocom.2010.5684215.
Pełny tekst źródłaTorres-Huitzil, C. "Hardware realization of a lightweight 2D cellular automata-based cipher for image encryption". W 2013 IEEE 4th Latin American Symposium on Circuits and Systems (LASCAS). IEEE, 2013. http://dx.doi.org/10.1109/lascas.2013.6519023.
Pełny tekst źródłaAlizadeh, Mojtaba, Jafar Shayan, Mazdak Zamani i Touraj Khodadadi. "Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance". W 2012 IEEE Conference on Open Systems (ICOS). IEEE, 2012. http://dx.doi.org/10.1109/icos.2012.6417641.
Pełny tekst źródłaAl-Shatari, Mohammed, Fawnizu Azmadi Hussin, Azrina Abd Aziz, Mohd Saufy Rohmad i Xuan-Tu Tran. "Composite Lightweight Authenticated Encryption Based on LED Block Cipher and PHOTON Hash Function for IoT Devices". W 2022 IEEE 15th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC). IEEE, 2022. http://dx.doi.org/10.1109/mcsoc57363.2022.00030.
Pełny tekst źródłaJang, Wonyoung, i Sun-Young Lee. "A format-preserving encryption FF1, FF3-1 using lightweight block ciphers LEA and, SPECK". W SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3341105.3373953.
Pełny tekst źródła