We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 3,033 results
  1. RAB: A lightweight block cipher algorithm with variable key length

    With the increasing security issues of data transmitted from wireless sensor network terminals, the traditional cryptographic algorithms cannot meet...

    **ng Zhang, Min Yang, ... Changda Wang in Peer-to-Peer Networking and Applications
    Article 07 June 2024
  2. RBFK cipher: a randomized butterfly architecture-based lightweight block cipher for IoT devices in the edge computing environment

    Internet security has become a major concern with the growing use of the Internet of Things (IoT) and edge computing technologies. Even though data...

    Sohel Rana, M. Rubaiyat Hossain Mondal, Joarder Kamruzzaman in Cybersecurity
    Article Open access 01 February 2023
  3. A lightweight and robust block cipher algorithm for real-time applications

    Ensuring the protection of big data during transmission or storage represents a highly significant concern for both enterprises and individual users....

    Amal Hafsa, Mohamed Gafsi, Mohsen Machhout in Signal, Image and Video Processing
    Article 26 November 2023
  4. Robust hardware implementation of a block-cipher scheme based on chaos and biological algebraic operations

    Currently, chaos-based cryptosystems are widely used for the reason of protecting sensitive data. Various different chaos-based cryptography systems...

    Rim Amdouni, Mohamed Gafsi, ... Abdellatif Mtibaa in Multimedia Tools and Applications
    Article 18 March 2023
  5. SCENERY: a lightweight block cipher based on Feistel structure

    In this paper, we propose a new lightweight block cipher called SCENERY. The main purpose of SCENERY design applies to hardware and software...

    **gya Feng, Lang Li in Frontiers of Computer Science
    Article 11 November 2021
  6. Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices

    The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 11 September 2023
  7. A reversible system based on hybrid toggle radius-4 cellular automata and its application as a block cipher

    The one-dimensional cellular automata (CA) system detailed herein uses a hybrid mechanism to attain reversibility, and this approach is adapted to...

    Everton R. Lira, Heverton B. de MacĂŞdo, ... Gina M. B. Oliveira in Natural Computing
    Article 25 March 2023
  8. Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher

    Meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES block cipher in the single-key...

    Jiqiang Lu, Wenchang Zhou in Designs, Codes and Cryptography
    Article 24 November 2023
  9. FPGA Implementation of SLIM an Ultra-Lightweight Block Cipher for IoT Applications

    Increased security of radio frequency identification (RFIDRadio Frequency Identification (RFID)) systems which are resource-constrained devices is in...
    Shashank Chandrakar, Siddharth Dewangan, ... Bibhudendra Acharya in Intelligent Control, Robotics, and Industrial Automation
    Conference paper 2023
  10. Design, Implementation and Analysis of HIBRI Cipher on IoT Platforms

    With the exponential growth of the Internet of Things through time there has been an enormous increase in the usage of tiny devices and information...

    H. R. Nagesh, Asmita Poojari, V. G. Kiran Kumar in Journal of The Institution of Engineers (India): Series B
    Article 11 May 2024
  11. FPGA implementation novel lightweight MBRISI cipher

    The advancement Internet of things has led to an increasing exchange of information. Privacy and security has become a major concern. In this...

    Asmita Poojary, V. G. Kiran Kumar, H. R. Nagesh in Journal of Ambient Intelligence and Humanized Computing
    Article 12 February 2022
  12. Comparative Study of Block Ciphers Implementation for Resource-Constrained Devices (Review)

    Abstract

    Lightweight cryptography (LWC) is critical for securing data between devices with limited resources. In this paper, we consider...

    Mahendra Shridhar Naik, Desai Karanam Sreekantha, Kanduri V. S. S. S. S. Sairam in Radioelectronics and Communications Systems
    Article 01 March 2023
  13. Design Principle and Method of Lightweight Block Cipher Diffusion Layer

    Recently, due to the development and popularization of communication and computing technologies, new technologies have emerged one after another. The...
    Conference paper 2022
  14. SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations

    We revisit designing AND-RX block ciphers, that is, the designs assembled with the most fundamental binary operations—AND, Rotation and XOR...

    Shiyao Chen, Yanhong Fan, ... Chun Guo in Designs, Codes and Cryptography
    Article 19 November 2021
  15. FUTURE: A Lightweight Block Cipher Using an Optimal Diffusion Matrix

    In this work, we present FUTURE, a new 64-bit lightweight SPN-based block cipher. FUTURE encrypts data in a single clock cycle with a very low...
    Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta in Progress in Cryptology - AFRICACRYPT 2022
    Conference paper 2022
  16. Design of Nonlinear Component of Block Cipher Over Non-Chain Semi-Local Ring with its Application to Color Image Encryption

    The innovative approach to encryption proposed in this manuscript is designed to increase the security of data in various applications. This approach...

    Muhammad Umair Safdar, Tariq Shah, Asif Ali in Arabian Journal for Science and Engineering
    Article 16 April 2024
  17. Research on Differential Power Analysis of Lightweight Block Cipher LED

    LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID...
    Conference paper 2021
  18. Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques

    The rapidly evolving field of biometric recognition and verification technologies has seen substantial progress recently. However, the storage of...

    Fatma A. Hossam Eldein Mohamed, Walid El-Shafai, ... Moustafa H. Aly in Optical and Quantum Electronics
    Article 25 April 2024
  19. Algebraic fault analysis based on decomposition of higher-order nonlinear S-boxes in lightweight block ciphers

    Nowadays, with the development of the Internet of Things and information security technologies, lightweight block ciphers are gradually being widely...

    **ng Fang, Hongxin Zhang, ... Fan Fan in Nonlinear Dynamics
    Article 04 May 2023
  20. Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher

    In the single-key attack scenario, meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES...
    Jiqiang Lu, Wenchang Zhou in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.