We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,502 results
  1. A Comparison of Lightweight Cryptographic Algorithms

    Most IoT devices or WSN devices have limitations on memory, power, and energy consumption. Therefore, it is impossible to implement traditional...
    Conference paper 2024
  2. Benchmarking of lightweight cryptographic algorithms for wireless IoT networks

    Cryptographic algorithms that can provide both encryption and authentication are increasingly required in modern security architectures and protocols...

    Soline Blanc, Abdelkader Lahmadi, ... Lama Sleem in Wireless Networks
    Article 22 July 2022
  3. A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model

    Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic...

    Ke Yuan, Yabing Huang, ... Chunfu Jia in Complex & Intelligent Systems
    Article Open access 21 August 2023
  4. Performance Analysis of Hybrid Cryptographic Algorithms in Serverless Platforms

    Serverless computing has become the buzzword in IT and it has been widely accepted because of its diverse cloud computing benefits. One of the major...
    Vinay Raj, Satharla Suresh, M. S. B. Phridviraj in Advanced Computing and Intelligent Technologies
    Conference paper 2024
  5. Performance Comparison of Cryptographic Algorithms Used in Cloud Computing

    Cloud computing is a rapidly growing technology, but because of its distributed nature, it is also susceptible to attacks. To ensure security, data...
    Neha Juyal, Eeshita Deepta, Dolly Sharma in Advances in Engineering Design
    Conference paper 2023
  6. An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution

    One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...

    Jananya Sivakumar, Sannasi Ganapathy in Wireless Personal Communications
    Article 01 December 2023
  7. A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks

    As Edge AI systems become more prevalent, ensuring data privacy and security in these decentralized networks is essential. In this work, a novel...

    Abdulmohsen Almalawi, Shabbir Hassan, ... Asif Irshad Khan in International Journal of Computational Intelligence Systems
    Article Open access 06 February 2024
  8. Analysis of Different Cryptographic Algorithms in Cloud-Based Multi-robot Systems

    Nowadays, securing data over the network become an important concern. When the data is travelled between Robots and the Cloud then there is high...
    Saurabh Jain, Shireen Rafat Alam, Rajesh Doriya in IoT Based Control Networks and Intelligent Systems
    Conference paper 2023
  9. Hybrid multi-criteria decision-making technique for the selection of best cryptographic multivalued Boolean function

    Robustness of modern information confidentiality algorithm depends on its individual components. Modern block ciphers highly depend on two...

    Nabilah Abughazalah, Majid Khan, Mohsin Iqbal in Complex & Intelligent Systems
    Article Open access 25 July 2023
  10. Comparative Research of Fluid Cryptographic Transformation Algorithms

    The requirements for PRS generators for use in SSC algorithms are determined by several aspects: a large sequence of sequences being formed, that is,...
    Alexandr Alexandrovich Kuznetsov, Oleksandr Volodymyrovych Potii, ... Natalia Kryvinska in Stream Ciphers in Modern Real-time IT Systems
    Chapter 2022
  11. Cryptographic Backdoors

    Cryptographic backdoors are a special type of cryptographic attack. These are alterations in cryptographic algorithms and protocols to allow the...
    Chuck Easttom in Modern Cryptography
    Chapter 2022
  12. A Survey of Cryptographic Algorithms for Encryption and Key Transmission

    Protecting digital information is crucial because it may contain sensitive information. Cryptography plays a large role in securing sensitive data....
    Priyanka Kizhekethottam, Bhagyashree Takale, ... Meghana Lokhande in Congress on Smart Computing Technologies
    Conference paper 2023
  13. Novel cryptographic hash function based on multiple compressive parallel structures

    As a fundamental cryptographic primitive, hash function is used in various cryptographic applications, such as cloud storage, digital signature,...

    Yijun Yang, ** Tian, ... **ayan Zhang in Soft Computing
    Article 29 September 2022
  14. DeCrypt: a 3DES inspired optimised cryptographic algorithm

    Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for...

    Deepraj Chowdhury, Ajoy Dey, ... Waleed S. Alnumay in Journal of Ambient Intelligence and Humanized Computing
    Article 23 September 2022
  15. Cryptographic Hashes

    Cryptographic hashes are essential for cybersecurity. Cryptographic hashes are utilized for wide range of applications including password storage and...
    Chuck Easttom in Modern Cryptography
    Chapter 2022
  16. Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making

    In modern block ciphers, the role of the substitution boxes is to generate ciphertext from the plaintext with high confusion. The immunity to various...

    Nabilah Abughazalah, Lal Said, Majid Khan in Soft Computing
    Article 10 October 2023
  17. Fault Injection Resistant Cryptographic Hardware

    Fault injection attacks are a growing threat in today’s integrated circuits. Cryptographic algorithms are being employed on more and more devices,...
    Mark Tehranipoor, Nitin Pundir, ... Farimah Farahmandi in Hardware Security Primitives
    Chapter 2023
  18. A Detailed Comparative Study and Performance Analysis of Standard Cryptographic Algorithms

    Nowadays the most important issue we face during data transmission and exchanging of data is security of data. The cryptographic algorithms play very...
    Chetan Rathod, Atul Gonsai in Cyber Security and Digital Forensics
    Conference paper 2022
  19. An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System

    IoT connects billions of heterogeneous devices, known as Things, using various communication technologies and protocols to enable end users to access...
    Ahina George, Divya James, K. S. Lakshmi in ICT with Intelligent Applications
    Conference paper 2023
  20. Side-Channel Protection in Cryptographic Hardware

    Cryptographic hardware has emerged as a solution to the high computation cost of cryptographic operations on the software. Using hardware to perform...
    Mark Tehranipoor, Nitin Pundir, ... Farimah Farahmandi in Hardware Security Primitives
    Chapter 2023
Did you find what you were looking for? Share feedback.