Search
Search Results
-
A Comparison of Lightweight Cryptographic Algorithms
Most IoT devices or WSN devices have limitations on memory, power, and energy consumption. Therefore, it is impossible to implement traditional... -
Benchmarking of lightweight cryptographic algorithms for wireless IoT networks
Cryptographic algorithms that can provide both encryption and authentication are increasingly required in modern security architectures and protocols...
-
A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model
Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic...
-
Performance Analysis of Hybrid Cryptographic Algorithms in Serverless Platforms
Serverless computing has become the buzzword in IT and it has been widely accepted because of its diverse cloud computing benefits. One of the major... -
Performance Comparison of Cryptographic Algorithms Used in Cloud Computing
Cloud computing is a rapidly growing technology, but because of its distributed nature, it is also susceptible to attacks. To ensure security, data... -
An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...
-
A Hybrid Cryptographic Mechanism for Secure Data Transmission in Edge AI Networks
As Edge AI systems become more prevalent, ensuring data privacy and security in these decentralized networks is essential. In this work, a novel...
-
Analysis of Different Cryptographic Algorithms in Cloud-Based Multi-robot Systems
Nowadays, securing data over the network become an important concern. When the data is travelled between Robots and the Cloud then there is high... -
Hybrid multi-criteria decision-making technique for the selection of best cryptographic multivalued Boolean function
Robustness of modern information confidentiality algorithm depends on its individual components. Modern block ciphers highly depend on two...
-
Comparative Research of Fluid Cryptographic Transformation Algorithms
The requirements for PRS generators for use in SSC algorithms are determined by several aspects: a large sequence of sequences being formed, that is,... -
Cryptographic Backdoors
Cryptographic backdoors are a special type of cryptographic attack. These are alterations in cryptographic algorithms and protocols to allow the... -
A Survey of Cryptographic Algorithms for Encryption and Key Transmission
Protecting digital information is crucial because it may contain sensitive information. Cryptography plays a large role in securing sensitive data.... -
Novel cryptographic hash function based on multiple compressive parallel structures
As a fundamental cryptographic primitive, hash function is used in various cryptographic applications, such as cloud storage, digital signature,...
-
DeCrypt: a 3DES inspired optimised cryptographic algorithm
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for...
-
Cryptographic Hashes
Cryptographic hashes are essential for cybersecurity. Cryptographic hashes are utilized for wide range of applications including password storage and... -
Construction of optimum multivalued cryptographic Boolean function using artificial bee colony optimization and multi-criterion decision-making
In modern block ciphers, the role of the substitution boxes is to generate ciphertext from the plaintext with high confusion. The immunity to various...
-
Fault Injection Resistant Cryptographic Hardware
Fault injection attacks are a growing threat in today’s integrated circuits. Cryptographic algorithms are being employed on more and more devices,... -
A Detailed Comparative Study and Performance Analysis of Standard Cryptographic Algorithms
Nowadays the most important issue we face during data transmission and exchanging of data is security of data. The cryptographic algorithms play very... -
An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System
IoT connects billions of heterogeneous devices, known as Things, using various communication technologies and protocols to enable end users to access... -
Side-Channel Protection in Cryptographic Hardware
Cryptographic hardware has emerged as a solution to the high computation cost of cryptographic operations on the software. Using hardware to perform...