Academic literature on the topic 'Lightweight cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lightweight cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Lightweight cryptography"
Suryateja, P. S., and K. Venkata Rao. "A Survey on Lightweight Cryptographic Algorithms in IoT." Cybernetics and Information Technologies 24, no. 1 (March 1, 2024): 21–34. http://dx.doi.org/10.2478/cait-2024-0002.
Full textAL-WATTAR, Auday H. "A NEW PROPOSED LIGHTWEIGHT CIPHER." MINAR International Journal of Applied Sciences and Technology 05, no. 04 (December 1, 2023): 192–205. http://dx.doi.org/10.47832/2717-8234.17.14.
Full textJohn, Anita, and Jimmy Jose. "Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions." Complex Systems 32, no. 2 (October 15, 2023): 171–88. http://dx.doi.org/10.25088/complexsystems.32.2.171.
Full textDewamuni, Zenith, Bharanidharan Shanmugam, Sami Azam, and Suresh Thennadil. "Bibliometric Analysis of IoT Lightweight Cryptography." Information 14, no. 12 (November 28, 2023): 635. http://dx.doi.org/10.3390/info14120635.
Full textBuchanan, William J., Shancang Li, and Rameez Asif. "Lightweight cryptography methods." Journal of Cyber Security Technology 1, no. 3-4 (October 2017): 187–201. http://dx.doi.org/10.1080/23742917.2017.1384917.
Full textXiao, Dianyan, and Yang Yu. "Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4957045.
Full textZhukov, Aleksey. "Lightweight Cryptography. Part 1." Voprosy kiberbezopasnosti, no. 1(9) (2015): 26–43. http://dx.doi.org/10.21681/2311-3456-2015-1-26-43.
Full textKhan, Safiullah, Wai-Kong Lee, Abdul Majeed, and Seong Oun Hwang. "Blockchain meets lightweight cryptography." IEEE Potentials 41, no. 6 (November 2022): 38–42. http://dx.doi.org/10.1109/mpot.2022.3204849.
Full textKumar,, Varun. "Challenges and Future Trends of Cryptography in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 10, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30505.
Full textLada, Nataliia, and Yuliia Rudnytska. "IMPLEMENTATION OF A METHOD FOR SYNTHESIZING GROUPS OF SYMMETRIC DOUBLE-OPERAND OPERATIONS OF CRYPTOGRAPHIC INFORMATION CODING FOR BLOCK ENCRYPTION SYSTEMS." Innovative Technologies and Scientific Solutions for Industries, no. 2 (20) (June 30, 2022): 35–43. http://dx.doi.org/10.30837/itssi.2022.20.035.
Full textDissertations / Theses on the topic "Lightweight cryptography"
Poschmann, Axel York. "Lightweight cryptography cryptographic engineering for a pervasive world." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/996578153/04.
Full textHitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Full textHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Full textMikhalev, Vasily [Verfasser], and Frederik [Akademischer Betreuer] Armknecht. "Lightweight symmetric cryptography / Vasily Mikhalev ; Betreuer: Frederik Armknecht." Mannheim : Universitätsbibliothek Mannheim, 2018. http://d-nb.info/1188564331/34.
Full textColeman, Flora Anne. "A Hardware Evaluation of a NIST Lightweight Cryptography Candidate." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98758.
Full textMaster of Science
In today's society, interactions with connected, data-sharing devices have become common. For example, devices like "smart" watches, remote access home security systems, and even connected vending machines have been adopted into many people's day to day routines. The Internet of Things (IoT) is the term used to describe networks of these interconnected devices. As the number of these connected devices continues to grow, there is an increased focus on the security of the IoT. Depending on the type of IoT application, a variety of different types of data can be transmitted. One way in which these data transfers can be protected is through the use of cryptographic protocols. The use of cryptography can provide assurances during data transfers. For example, it can prevent an attacker from reading the contents of a sensitive message. There are several well studied cryptographic protocols in use today. However, many of these protocols were intended for use in more traditional computing platforms. IoT devices are typically much smaller in size than traditional computing platforms. This makes it difficult for them to support these well studied protocols. Therefore, there have been efforts to investigate and standardize new lightweight cryptographic protocols which are well suited for smaller IoT devices. This work analyzes several hardware implementations of an algorithm which was proposed as a submission to the National Institute of Standards and Technology (NIST) Lightweight Cryptography Standardization Process. The analysis focuses on metrics which can be used to evaluate its suitability for IoT devices.
Shahverdi, Aria. "Lightweight Cryptography Meets Threshold Implementation: A Case Study for SIMON." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-theses/985.
Full textGulcan, Ege. "Flexible and Lightweight Cryptographic Engines for Constrained Systems." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52913.
Full textMaster of Science
Mane, Deepak Hanamant. "Energy-harvested Lightweight Cryptosystems." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/48124.
Full textMaster of Science
Portella, Rodrigo. "Balancing energy, security and circuit area in lightweight cryptographic hardware design." Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLEE036/document.
Full textThis thesis addresses lightweight hardware design and countermeasures to improve cryptographic computation. Because cryptography (and cryptanalysis) is nowadays becoming more and more ubiquitous in our daily lives, it is crucial that newly developed systems are robust enough to deal with the increasing amount of processing data without compromising the overall security. This work addresses many different topics related to lightweight cryptographic implementations. The main contributions of this thesis are: - A new cryptographic hardware acceleration scheme applied to BCH codes; - Hardware power minimization applied to SoCs and embedded devices; - Timing and DPA lightweight countermeasures applied to the reconfigurable AES block cipher; - CSAC: A cryptographically secure on-chip firewall; - Frequency analysis attack experiments; - A new zero-knowledge zero-knowledge protocol applied to wireless sensor networks; - OMD: A new authenticated encryption scheme
Hamann, Matthias [Verfasser], Matthias [Akademischer Betreuer] Krause, and Willi [Akademischer Betreuer] Meier. "Lightweight Cryptography on Ultra-Constrained RFID Devices / Matthias Hamann ; Betreuer: Willi Meier, Matthias Krause." Mannheim : Universitätsbibliothek Mannheim, 2018. http://d-nb.info/1160876355/34.
Full textBooks on the topic "Lightweight cryptography"
Cole, Peter H., and Damith C. Ranasinghe, eds. Networked RFID Systems and Lightweight Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71641-9.
Full textEisenbarth, Thomas, and Erdinç Öztürk, eds. Lightweight Cryptography for Security and Privacy. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-16363-5.
Full textBogdanov, Andrey, ed. Lightweight Cryptography for Security and Privacy. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55714-4.
Full textAvoine, Gildas, and Orhun Kara, eds. Lightweight Cryptography for Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40392-7.
Full textGüneysu, Tim, Gregor Leander, and Amir Moradi, eds. Lightweight Cryptography for Security and Privacy. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29078-2.
Full textPeter H. Cole,Damith C. Ranasinghe. Networked Rfid Systems and Lightweight Cryptography. Springer, 2008.
Find full textMohamed, Khaled Salah. New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA. Springer International Publishing AG, 2020.
Find full textMohamed, Khaled Salah. New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA. Springer International Publishing AG, 2021.
Find full textCole, Peter H., and Damith C. Ranasinghe. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting. Springer Berlin / Heidelberg, 2010.
Find full textCole, Peter H., and Damith C. Ranasinghe. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting. Springer London, Limited, 2007.
Find full textBook chapters on the topic "Lightweight cryptography"
Tehranipoor, Mark, Nitin Pundir, Nidish Vashistha, and Farimah Farahmandi. "Lightweight Cryptography." In Hardware Security Primitives, 213–27. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-19185-5_12.
Full textFranklin, Matthew K., and Dahlia Malkhi. "Auditable metering with lightweight security." In Financial Cryptography, 151–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 1997. http://dx.doi.org/10.1007/3-540-63594-7_75.
Full textCharles, Subodha, and Prabhat Mishra. "Lightweight Encryption Using Incremental Cryptography." In Network-on-Chip Security and Privacy, 79–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69131-8_4.
Full textKuwakado, Hidenori, and Shoichi Hirose. "Hashing Mode Using a Lightweight Blockcipher." In Cryptography and Coding, 213–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-45239-0_13.
Full textRanasinghe, Damith C. "Lightweight Cryptography for Low Cost RFID." In Networked RFID Systems and Lightweight Cryptography, 311–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-71641-9_18.
Full textWu, Wenling, and Lei Zhang. "LBlock: A Lightweight Block Cipher." In Applied Cryptography and Network Security, 327–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21554-4_19.
Full textBokhari, M. U., and Shabbir Hassan. "A Comparative Study on Lightweight Cryptography." In Advances in Intelligent Systems and Computing, 69–79. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8536-9_8.
Full textWahsheh, Heider A. M., and Mohammed S. Al-Zahrani. "QR Codes Cryptography: A Lightweight Paradigm." In International Conference on Information Systems and Intelligent Applications, 649–58. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16865-9_52.
Full textShraddha, B. H., Bhagyashree Kinnal, Heera Wali, Nalini C. Iyer, and P. Vishal. "Lightweight Cryptography for Resource Constrained Devices." In Hybrid Intelligent Systems, 553–64. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96305-7_51.
Full textMoosavi, Sanaz Rahimi, and Arman Izadifar. "End-to-End Security Scheme for E-Health Systems Using DNA-Based ECC." In Silicon Valley Cybersecurity Conference, 77–89. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96057-5_6.
Full textConference papers on the topic "Lightweight cryptography"
A, Babu Karuppiah, Rajaraja R, Resma Madhu P. K, Susithra N, Pradeepika N, and Gopika G. "Resource Analysis of Lightweight Cryptography Algorithms for Compact Devices." In 2024 International Conference on Smart Systems for Electrical, Electronics, Communication and Computer Engineering (ICSSEECC), 579–84. IEEE, 2024. http://dx.doi.org/10.1109/icsseecc61126.2024.10649478.
Full textR, Sivaraman, Gowtham S, Gopalakrishnan G, Muralidharan D, Muthaiah R, and Shankar Sriram V S. "FPGA Governed Edge Device Confidentiality: Lightweight Cryptography with Enhanced Security." In 2024 Control Instrumentation System Conference (CISCON), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/ciscon62171.2024.10696143.
Full textZhukov, Alexey. "Lightweight cryptography." In SIN '15: The 8th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2799979.2799981.
Full textYalla, Panasayya, and Jens-Peter Kaps. "Lightweight Cryptography for FPGAs." In 2009 International Conference on Reconfigurable Computing and FPGAs (ReConFig). IEEE, 2009. http://dx.doi.org/10.1109/reconfig.2009.54.
Full textA. Gunathilake, Nilupulee, Ahmed Al-Dubai, William J. Buchanan, and Owen Lo. "Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT." In 10th International Conference on Information Technology Convergence and Services (ITCSE 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110915.
Full textBarbero, A., G. Horler, A. Kholosha, and O. Ytrehus. "Lightweight cryptography for RFID devices." In IET Conference on Wireless, Mobile and Multimedia Networks. IEE, 2008. http://dx.doi.org/10.1049/cp:20080200.
Full textAlippi, Cesare, Andrey Bogdanov, and Francesco Regazzoni. "Lightweight cryptography for constrained devices." In 2014 International Symposium on Integrated Circuits (ISIC). IEEE, 2014. http://dx.doi.org/10.1109/isicir.2014.7029580.
Full textDehnavi, S. M., M. R. Mirzaee Shamsabad, and A. Mahmoodi Rishakani. "Lightweight Involutive Components for Symmetric Cryptography." In 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, 2019. http://dx.doi.org/10.1109/iscisc48546.2019.8985148.
Full textShahbodin, Faaizah, A. H. Azni, Tasnuva Ali, and Che Ku Nuraini Che Ku Mohd. "Lightweight Cryptography Techniques for MHealth Cybersecurity." In the 2019 Asia Pacific Information Technology Conference. New York, New York, USA: ACM Press, 2019. http://dx.doi.org/10.1145/3314527.3314536.
Full textPatel, Shehnaz T., and Nital H. Mistry. "A survey: Lightweight cryptography in WSN." In 2015 International Conference on Communication Networks (ICCN). IEEE, 2015. http://dx.doi.org/10.1109/iccn.2015.3.
Full textReports on the topic "Lightweight cryptography"
McKay, Kerry A., Larry Bassham, Meltem Sonmez Turan, and Nicky Mouha. Report on lightweight cryptography. Gaithersburg, MD: National Institute of Standards and Technology, March 2017. http://dx.doi.org/10.6028/nist.ir.8114.
Full textGunathilake, Nilupulee, Ahmed Al-Dubai, and William Buchanan. Recent advances and trends in lightweight cryptography for IoT security. Peeref, March 2023. http://dx.doi.org/10.54985/peeref.2303p1883219.
Full textTuran, Meltem Sönmez, Kerry A. McKay, Çağdaş Çalık, Donghoon Chang, and Larry Bassham. Status report on the first round of the NIST lightweight cryptography standardization process. Gaithersburg, MD: National Institute of Standards and Technology, October 2019. http://dx.doi.org/10.6028/nist.ir.8268.
Full textSonmez Turan, Meltem, Kerry McKay, Donghoon Chang, Cagdas Calik, Lawrence Bassham, Jinkeon Kang, and John Kelsey. Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process. National Institute of Standards and Technology, July 2021. http://dx.doi.org/10.6028/nist.ir.8369.
Full textTuran, Meltem Sonmez. Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process. Gaithersburg, MD: National Institute of Standards and Technology, 2022. http://dx.doi.org/10.6028/nist.ir.8454.
Full textYuen, Horace P., Majjid Sarrafzadeh, Agnes Chan, and Aggelos Katsagelos. Lightweight Cryptographic Techniques. Fort Belvoir, VA: Defense Technical Information Center, March 2004. http://dx.doi.org/10.21236/ada422156.
Full text