A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues

BJ Mohd, T Hayajneh, AV Vasilakos - Journal of Network and Computer …, 2015 - Elsevier
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …

A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

[图书][B] Pengantar ilmu kriptografi: teori analisis & implementasi

D Ariyus - 2008 - books.google.com
Masalah keamanan komputer dan kerahasiaan data merupakan sesuatu yang sangat
penting dalam era informasi ini. Keamanan data pada komputer tidak hanya tergantung …

[图书][B] Understanding PKI: concepts, standards, and deployment considerations

C Adams, S Lloyd - 2003 - books.google.com
Public-Key Infrastructure (PKI) is the foundation of the four major elements of digital security:
authentication, integrity, confidentiality, and non-repudiation. The idea of a public-key …

[图书][B] IPSec: the new security standard for the Internet, intranets, and virtual private networks

N Doraswamy, D Harkins - 2003 - books.google.com
IPSec, Second Edition is the most authoritative, comprehensive, accessible, and up-to-date
guide to IPSec technology. Two leading authorities cover all facets of IPSec architecture …

A survey of the elliptic curve integrated encryption scheme

V Gayoso Martínez, L Hernández Encinas… - 2010 - digital.csic.es
Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography based on the
arithmetic of elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP) …

CommBench-a telecommunications benchmark for network processors

T Wolf, M Franklin - … on Performance Analysis of Systems and …, 2000 - ieeexplore.ieee.org
The paper presents a benchmark, CommBench, for use in evaluating and designing
telecommunications network processors. The benchmark applications focus on small …

A survey on software implementation of lightweight block ciphers for IoT devices

A Sevin, AAO Mohammed - Journal of Ambient Intelligence and …, 2023 - Springer
Internet of things (IoT) is a computing concept that illustrates how things are connected to the
internet and can communicate with other things. IoT consists of masses of physical devices …

Lightweight cryptographic techniques for automotive cybersecurity

AK Jadoon, L Wang, T Li, MA Zia - … and Mobile Computing, 2018 - Wiley Online Library
A new integration of wireless communication technologies into the automobile industry has
instigated a momentous research interest in the field of Vehicular Ad Hoc Network (VANET) …

RFC2409: The Internet key exchange (IKE)

D Harkins, D Carrel - 1998 - dl.acm.org
Network Working Group D. Harkins Request for Comments: 2409 D. Carrel Category: Standards
Track cisco Systems Novemb Page 1 Network Working Group D. Harkins Request for Comments …