[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

[图书][B] Image and video encryption: from digital rights management to secured personal communication

A Uhl, A Pommer - 2004 - books.google.com
Image and Video Encryption provides a unified overview of techniques for encryption of
images and video data. This ranges from commercial applications like DVD or DVB to more …

LAMED—a PRNG for EPC class-1 generation-2 RFID specification

P Peris-Lopez, JC Hernandez-Castro… - Computer Standards & …, 2009 - Elsevier
RFID is a relatively heterogenous radio technology, where it is necessary to put an extra
effort on security and privacy-related issues. As early as 2004, some authors suggested the …

Lightweight block cipher for resource constrained iot environment—an survey, performance, cryptanalysis and research challenges

M Abinaya, S Prabakeran - IoT Based Control Networks and Intelligent …, 2022 - Springer
Abstract Nowadays IoT (Internet of Things) is becoming a more popular environment and
has a variety of applications like Smart Home, Smart Healthcare, Vehicles, and many …

A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map

A Ali, MA Khan, RK Ayyasamy, M Wasif - PeerJ Computer Science, 2022 - peerj.com
Cryptography deals with designing practical mathematical algorithms having the two
primitive elements of confusion and diffusion. The security of encrypted data is highly …

Performance evaluation of cryptographic ciphers on IoT devices

P Singh, K Deshpande - arXiv preprint arXiv:1812.02220, 2018 - arxiv.org
With the advent of Internet of Things (IoT) and the increasing use of application-based
processors, security infrastructure needs to be examined on some widely-used IoT hardware …

Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data

HI Kim, S Hong, JW Chang - Data & Knowledge Engineering, 2016 - Elsevier
Research on preserving location data privacy in outsourced databases has been spotlighted
with the development of cloud computing. However, the existing spatial transformation …

Solving the simultaneous scanning problem anonymously: clumping proofs for RFID tags

P Peris-Lopez, JC Hernandez-Castro… - … on Security, Privacy …, 2007 - ieeexplore.ieee.org
The vast majority of works on RFID security focus only on privacy and tracking (violation of
location privacy). However, in this paper we are interested in a new mechanism that enables …

A review on evolution of symmetric key block ciphers and their applications

AN Tentu - IETE Journal of Education, 2020 - Taylor & Francis
This paper reviews the state of the art of symmetric key block cipher designs and their
essential security role in several applications like IoT, low-power devices like motes, etc …

[PDF][PDF] Anonymous coexistence proofs for RFID tags

NW Lo, KH Yeh - Journal of Information Science and Engineering, 2010 - academia.edu
In a world with RFID carriers everywhere, the coexistence proof of multiple RFID-tagged
objects shown at the same time and the same place can become a very useful mechanism …