G Avoine, X Carpent, B Martin - Journal of Network and Computer …, 2012 - Elsevier
In the recent years, there has been an increasing interest in the development of secure and private authentication protocols for RFID. In order to suit the very lightweight nature of RFID …
M Khalid, U Mujahid… - International Journal of …, 2018 - journals.sagepub.com
Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with …
We propose a new mode of operation called ZMAC allowing to construct a (stateless and deterministic) message authentication code (MAC) from a tweakable block cipher (TBC) …
This paper presents a design of authenticated encryption (AE) focusing on minimizing the implementation size, ie, hardware gates or working memory on software. The scheme is …
I Ahmed, A James, D Singh - Security and communication …, 2014 - Wiley Online Library
ABSTRACT CCM/CCMP is a two‐cycle authenticate and encrypt (AE) mode. One cycle is used to perform confidentiality computations, and the second cycle is used to compute …
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking …
With the increase of connected devices being introduced into the market each day, the Internet of Things (IoT) vision is progressively becoming a reality. This phenomenon …
Abstract Radio Frequency IDentification (RFID) is one of the most promising identification schemes in the field of pervasive systems. Unique identification and non-line of sight …
This paper presents a lightweight blockcipher-based authenticated encryption mode mainly focusing on minimizing the implementation size, ie, hardware gates or working memory on …