[PDF][PDF] Report on light weight cryptography

K McKay - 2016 - gocs.com.de
NIST-approved cryptographic standards were designed to perform well using general-
purpose computers. In recent years, there has been increased deployment of small …

[PDF][PDF] Recommendation for key-derivation methods in key-establishment schemes

E Barker, L Chen, R Davis - NIST Special Publication, 2018 - nvlpubs.nist.gov
Recommendation for Key-Derivation Methods in Key-Establishment Schemes Page 1 NIST
Special Publication 800-56C Revision 2 Recommendation for Key-Derivation Methods in …

A systematic technical survey of lightweight cryptography on IoT environment

A Alahdal, NK Deshmukh - International Journal of Scientific & …, 2020 - papers.ssrn.com
The world becomes a small village due to the connecting heterogeneous devices such as
RFID, smart devices, sensors. Systems such as the system of large industrial companies …

ANCHOR: Logically centralized security for software-defined networks

D Kreutz, J Yu, FMV Ramos… - ACM Transactions on …, 2019 - dl.acm.org
Software-defined networking (SDN) decouples the control and data planes of traditional
networks, logically centralizing the functional properties of the network in the SDN controller …

Smart and secure cross-device apps for the internet of advanced things

C Busold, S Heuser, J Rios, AR Sadeghi… - … Cryptography and Data …, 2015 - Springer
Today, cross-device communication and intelligent resource sharing among smart devices
is limited and inflexible: Typically devices cooperate using fixed interfaces provided by …

There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation

Y Zhang, Y Song, S Li, W Li, Z Lai, Q Tang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
A central advantage of deploying cryptosystems is that the security of large high-sensitive
data sets can be reduced to the security of a very small key. The most popular way to …

Robust security framework with bit‐flipping attack and timing attack for key derivation functions

WW Koh, CW Chuah - IET Information Security, 2020 - Wiley Online Library
A Key Derivation Function (KDF) derives cryptographic keys from private string and public
information. The security property for the cryptographic keys is indistinguishable from the …

A framework for security analysis of key derivation functions

CC Wen, E Dawson, JM González Nieto… - … Security Practice and …, 2012 - Springer
This paper presents a comprehensive formal security framework for key derivation functions
(KDF). The major security goal for a KDF is to produce cryptographic keys from a private …

Securing the Internet of Things: A review of Lightweight and low-power Cryptography Techniques

AHA Al-ahdal, MMH Ali, A Alahdal… - Abhath Journal of …, 2022 - ojs.abhath-ye.com
The current information related to security and IoT by conducting a theoretical and
methodological study. It provides a detailed explanation on what is the meaning of IoT and …

Redes neuronales para la desencriptación de mensajes codificados con atractores caóticos

SD Núñez Sánchez - repository.udistrital.edu.co
The work focuses on developing a new text encryption model that combines neural networks
and chaotic attractors to enhance the security of encoded messages. The project aims to …