Academic literature on the topic 'Light weight cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Light weight cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Light weight cryptography"

1

Alshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.

Full text
Abstract:
Recent breakthroughs in cryptographic technology are being thoroughly scrutinized due to their emphasis on innovative approaches to design, implementation, and attacks. Lightweight cryptography (LWC) is a technological advancement that utilizes a cryptographic algorithm capable of being adjusted to function effectively in various constrained environments. This study provides an in-depth analysis of elliptic curve cryptography (ECC), which is a type of asymmetric cryptographic method known as LWC. This cryptographic approach operates over elliptic curves and has two applications: key exchange a
APA, Harvard, Vancouver, ISO, and other styles
2

Abd Zaid, Mustafa, and Soukaena Hassan. "Proposal Framework to Light Weight Cryptography Primitives." Engineering and Technology Journal 40, no. 4 (2022): 516–26. http://dx.doi.org/10.30684/etj.v40i4.1679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.

Full text
Abstract:
Cryptography is used to make data and information transmission and computational systems secure over the networks by using mathematical and scientific techniques. The cryptographic algorithm should fulfil the conditions of authentication, confidentiality, integrity and reliability. In today’s era, where digital communication and data storage is increasing day by day and the data leakage, breaches and attacks are continuously rising. The increase in need of strong and secure cryptography algorithms to protect user information that ensures the integrity and confidentiality of data. The existing
APA, Harvard, Vancouver, ISO, and other styles
4

Alkhudaydi, Malak G., and Adnan A. Gutub. "Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications." Journal of Information Security and Cybercrimes Research 3, no. 1 (2020): 13–30. http://dx.doi.org/10.26735/fmit1649.

Full text
Abstract:
Cryptography and steganography are combined to provide practical data security. This paper proposes integrating light-weight cryptography with improved Arabic text steganography for optimizing security applications. It uses light-weight cryptography to cope with current limited device capabilities, to provide acceptable required security. The work tests hiding encrypted secret information within Arabic stego-cover texts, using all common diacritics found naturally in the Arabic language. The study considers different challenging situations and scenarios in order to evaluate security practicali
APA, Harvard, Vancouver, ISO, and other styles
5

Raja, M., Dr S. Dhanasekaran, and Dr V. Vasudevan. "Light Weight Cryptography based Medical Data and Image Encryption Scheme." Webology 18, no. 2 (2021): 88–104. http://dx.doi.org/10.14704/web/v18i2/web18309.

Full text
Abstract:
Many medical companies use cloud technology to collect, distribute and transmit medical records. Given the need for medical information, confidentiality is a key issue. In this study, we propose an encrypted scheme based on encrypted data for an electronic healthcare environment. We use hybrid Attribute based encryption and Triple DES encryption technique (ABETDES) scheme, including identity-based cryptography (IBC), to ensure data privacy through communication channels և to improve the reliability of cloud computing. There are also limited indicators of light processing and storage resources.
APA, Harvard, Vancouver, ISO, and other styles
6

Sangari, S., and Martin Leo Manickam. "A LIGHT-WEIGHT CRYPTOGRAPHY ANALYSIS FOR WIRELESS BASED HEALTHCARE APPLICATIONS." Journal of Computer Science 10, no. 10 (2014): 2088–94. http://dx.doi.org/10.3844/jcssp.2014.2088.2094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

B, Akhil, Muzammil Shareef Md, Shalini B, Fairooz SK, and Shaik Mohammed Rafi. "Light weight security coding using PRESENT algorithm for cryptography application." International Journal of VLSI and Signal Processing 7, no. 2 (2020): 1–5. http://dx.doi.org/10.14445/23942584/ijvsp-v7i2p101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yalamanchili, Anjani, D. Venkatasekhar, and G. Vijay Kumar. "Iot Based Alzheimer’s Disease Diagnosis Model for Providing Security Using Light Weight Hybrid Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 148–59. http://dx.doi.org/10.17762/ijritcc.v11i4.6398.

Full text
Abstract:
Security in the Internet of things (IoT) is a broad yet active research area that focuses on securing the sensitive data being circulated in the network. The data involved in the IoT network comes from various organizations, hospitals, etc., that require a higher range of security from attacks and breaches. The common solution for security attacks is using traditional cryptographic algorithms that can protect the content through encryption and decryption operations. The existing solutions are suffering from major drawbacks, including computational complexities, time and space complexities, slo
APA, Harvard, Vancouver, ISO, and other styles
9

Alassaf, Norah, and Adnan Gutub. "Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications." International Journal of E-Health and Medical Communications 10, no. 4 (2019): 1–15. http://dx.doi.org/10.4018/ijehmc.2019100101.

Full text
Abstract:
Short period monitoring and emergency notification of healthcare signals is becoming affordable with existence of internet of things (IoT) support. However, IoT does not prevent challenges that may hinder the appropriate safe spread of medical solutions. Confidentiality of data is vital, making a real fear requesting cryptography. The limitations in memory, computations processing, power consumptions, and small-size devices contradict the robust encryption process asking for help of low-weight-cryptography to handle practically. This article presents a comparative analysis of performance evalu
APA, Harvard, Vancouver, ISO, and other styles
10

MS, Dhruva, Gururaj H L, and Ramesh B. "Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things." International Journal of Engineering and Applied Computer Science 02, no. 05 (2017): 160–64. http://dx.doi.org/10.24032/ijeacs/0205/03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Light weight cryptography"

1

Reyes, Torres Oscar Mauricio [Verfasser]. "Neural Synchronization and Light-weight Cryptography in Embedded Systems / Oscar Mauricio Reyes Torres." Aachen : Shaker, 2012. http://d-nb.info/106773631X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.

Full text
Abstract:
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms facilitate the construction of trustworthy secure systems; however, existing hardware security approaches require modifications to the micro-architecture of the processor and such changes are extremely time consuming and expensive to test and implement. Additionally, they incorporate cryptographic security mechanisms that are computationally intensive and account for excessive energy consumption, which significantly degrades the performance of the system. In this dissertation, I explore the dom
APA, Harvard, Vancouver, ISO, and other styles
3

Adekunle, Andrew A. "Design and analysis of light-weight symmetric cryptographic frameworks and constructs for secure packet mode wireless communication." Thesis, University of Greenwich, 2012. http://gala.gre.ac.uk/9806/.

Full text
Abstract:
This thesis reports research undertaken to address the deficiencies that existing standardised cryptographic constructs exhibit when securing packet mode wireless communication in WSN. The aim of the research is to devise innovative cryptographic frameworks, which will facilitate design and implementation of light-weight symmetric cryptographic modular constructs. Four cryptographic frameworks have been devised and block cipher based light-weight constructs using the frameworks have been designed and benchmarked against contemporary standard constructs. The constructs introduced in this disser
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Hsi-Wen, and 王錫文. "A study on positioning mechanism and light-weight cryptography on active RFID systems." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/ab4fvr.

Full text
Abstract:
博士<br>國立臺北科技大學<br>電腦與通訊研究所<br>101<br>This study includes two parts: one is to implement and experiment an indoor positioning system based on an active Radio Frequency Identification (RFID) system, and the other is an authentication protocol with light weight cryptography implemented in an active RFID system. The first part of this study is mainly to implement an active RFID system for an indoor positioning service. The indoor positioning system uses four reference tags for the reference addresses and a tracked object equipped with an active tag. Reference tags transmit the received signal stre
APA, Harvard, Vancouver, ISO, and other styles
5

Ming-KungSun and 孫明功. "Light-Weight Cryptographic Protocols and Applications." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/13464593028480040489.

Full text
Abstract:
博士<br>國立成功大學<br>電腦與通信工程研究所<br>101<br>The concept of PKI is a cornerstone of modern security solutions. Its usage permeates many different applications where digital signatures, secure communications, and identity management play primary or auxiliary roles. It can be applied as a helper technology which assist other frameworks by lending its inherent attributes. This dissertation details three distinct applications of PKI concepts in three very different fields. Their respective contributions vary greatly, but they all owe their realization to the concepts of PKI. First, in the area of Distrib
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Light weight cryptography"

1

Buchanan, William J. "Light-weight Cryptography and Other Methods." In Cryptography. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337751-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Abdelraheem, Mohamed Ahmed, Julia Borghoff, Erik Zenner, and Mathieu David. "Cryptanalysis of the Light-Weight Cipher A2U2." In Cryptography and Coding. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25516-8_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Al Shebli, Hessa Mohammed Zaher, and Babak D. Beheshti. "Light Weight Cryptography for Resource Constrained IoT Devices." In Proceedings of the Future Technologies Conference (FTC) 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02686-8_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jilna, Payingat, and P. P. Deepthi. "Light Weight Key Establishment Scheme for Wireless Sensor Networks." In Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49445-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hamsha, K., and G. S. Nagaraja. "Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20615-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dandin, Theodore Jesudas E., D. Krishnaveni, and K. Chandrasekhar. "Light Weight Cryptography and Its Application in Resource Constrained Environment Using Reversible Logic." In Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6407-6_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yadav, Sameer, Surepalli Venkataratnam, P. Balaji Srikaanth, Jetti Madhavi, A. Basi Reddy, and R. Senthamil Selvan. "Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-73494-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sridharan, Ravi, and Thangakumar Jeyaprakash. "Security for Data in IOT Using a New APS Elliptic Curve Light Weight Cryptography Algorithm." In Artificial Intelligence Techniques for Advanced Computing Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5329-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shankar, K., and Mohamed Elhoseny. "An Optimal Light Weight Cryptography—SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks." In Lecture Notes in Electrical Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sasikaladevi, N., N. Mahalakshmi, and N. Archana. "LEACH- Genus 2 Hyper Elliptic Curve Based Secured Light-Weight Visual Cryptography for Highly Sensitive Images." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Light weight cryptography"

1

Poojari, Asmita, and Kiran Kumar V. G. "Design and Implementation of Light Weight Cryptography Using Spartan-6 FPGA." In 2024 2nd International Conference on Recent Advances in Information Technology for Sustainable Development (ICRAIS). IEEE, 2024. https://doi.org/10.1109/icrais62903.2024.10811729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

ul Haq, Tanveer, Inam Ul Haq, Naveed Ahmed, and Abdul Razzaq. "A Post Quantum Light Weight Cryptographic Algorithm over Quaternion Integers." In 2024 21st International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2024. https://doi.org/10.1109/ibcast61650.2024.10877187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buchanan, William J., and Leandros Maglaras. "Review of the NIST Light-Weight Cryptography Finalists." In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2023. http://dx.doi.org/10.1109/dcoss-iot58021.2023.00079.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mittal, Shikha, Chetna Monga, Kamal Upreti, Nishant Kumar, Ranjana Dinkar Raut, and Mohammad Shabbir Alam. "Light Weight Cryptography for Cloud-Based E-Health Records." In 2022 7th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2022. http://dx.doi.org/10.1109/icces54183.2022.9835827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sivakumar, R., J. Jayapriya, and N. Krishnan. "Comparison Study on SPN Type Light Weight Cryptography Algorithms for IoT." In 2022 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2022. http://dx.doi.org/10.1109/icict54344.2022.9850849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shan, Ruiwen, Sheng Di, Jon C. Calhoun, and Franck Cappello. "Exploring Light-weight Cryptography for Efficient and Secure Lossy Data Compression." In 2022 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2022. http://dx.doi.org/10.1109/cluster51413.2022.00018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prakash, Vishal, Ajay Vikram Singh, and Sunil Kumar Khatri. "A New Model of Light Weight Hybrid Cryptography for Internet of Things." In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2019. http://dx.doi.org/10.1109/iceca.2019.8821924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yao, Xuanxia, Xiaoguang Han, and Xiaojiang Du. "A light-weight certificate-less public key cryptography scheme based on ECC." In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2014. http://dx.doi.org/10.1109/icccn.2014.6911773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

John, Jacob, and Sinciya P. O. "Real-Time Distant Healthcare Monitoring IoT System Secured by Light Weight Cryptography." In 2023 Annual International Conference on Emerging Research Areas: International Conference on Intelligent Systems (AICERA/ICIS). IEEE, 2023. http://dx.doi.org/10.1109/aicera/icis59538.2023.10420248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thilagaraj, M., C. Arul Murugan, U. Ramani, C. Ganesh, and P. Sabarish. "A Survey of Efficient Light Weight Cryptography Algorithm for Internet of Medical Things." In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2023. http://dx.doi.org/10.1109/icaccs57279.2023.10112818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!