Search
Search Results
-
An improved chacha algorithm for securing data on IoT devices
In recent years, revolution of development was exceedingly quick in the Internet. Nevertheless, instead of only linking personal computers, mobiles...
-
SAT-Based Cryptanalysis of Salsa20 Cipher
Modeling through Boolean encoding is often used for the investigation of various kinds of algorithms or other computer systems. Such an approach can... -
CCSC—DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment
With the rapid advancement in the mobile and computing technologies, individuals have an inclination to depend more on them in varied range of...
-
Lightweight Block Cipher for Resource Constrained IoT Environment—An Survey, Performance, Cryptanalysis and Research Challenges
Nowadays IoT (Internet of Things) is becoming a more popular environment and has a variety of applications like Smart Home, Smart Healthcare,... -
State-of-the-Art Lightweight Cryptographic Protocols for IoT Networks
Due to technical improvements, the Internet of Things has enabled the networking of devices capable of collecting vast volumes of data. Consequently,... -
Comprehensive Study of Existing Stream Ciphers
Now a day’s internet of things is one of the rapidly growing research field in the information technology domain. Offering security for this... -
Lightweight Cryptography
Cryptography has become indispensable in protecting sensitive communication, data, and personal information. However, most conventional encryption... -
Secure and Efficient Transmission of Vision-Based Feedback Control Signals
An ever-increasing number of autonomous vehicles use bandwidth-greedy sensors such as cameras and LiDARs to sense and act to the world around us....
-
Evaluation of the Recommended Algorithms in the Internet of Things
In the recent revolution of exchanging information, more and more objects (things) become in need of a media that allows them to talk to each other.... -
A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model
Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic...
-
Even symmetric chaotic and skewed maps as a technique in video encryption
The massive growth and use of digital multimedia through computer networks, including video and images, have increased the demand for protecting this...
-
Blockchain for IoT: A Comprehensive Review for Precision Agricultural Networks
Internet of Things (IoT) has gained popularity in recent years due to the services it offers and its wide usage in the field of science and... -
Fault Attack
Fault attacks are a well-studied topic in the area of attacks on cryptography. They constitute a powerful tool to recover the secret key used in the... -
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata
Digital images play a vital role in multimedia communications in the modern era. With the advent of internet-of-things (IoT) applications, multimedia...
-
Edge Crypt-Pi: Securing Internet of Things with Light and Fast Crypto-Processor
In the IoT and edge computing landscape, security has increasingly become one of the critical design considerations. Due to that most of these... -
Security Techniques Implementation on Big Data Using Steganography and Cryptography
The COVID-19 pandemic has increased everyone’s exposure to the Internet thus there has been an addition of new people who now access the Internet and... -
Secure and Energy-Efficient IoT Systems Using SZ 1.4 and ChaCha12-Poly1305
Internet of things (IoT) has emerged as one of the most notable technological advancements in the present era’s computing industry. It has enabled... -
Enhancement the ChaCha20 Encryption Algorithm Based on Chaotic Maps
As a result of the increasing demand for lightweight applications, the researchers set out to implement appropriate security mechanisms, one of which... -
Cryptographic Hashes
Cryptographic hashes are essential for cybersecurity. Cryptographic hashes are utilized for wide range of applications including password storage and... -
Post-quantum Digital Signature Scheme for Personal Data Security in Communication Network Systems
The reliable collection, processing and storage of the sensitive personal data constitute an important research topic in the European context,...