搜索结果: 1-6 共查到“Lightweight cryptography”相关记录6条 . 查询时间(0.118 秒)
A deeper understanding of the XOR count distribution in the context of lightweight cryptography
lightweight cryptography finite field multiplication basis of finite field
font style='font-size:12px;'>
2016/5/3
In this paper, we study the behavior of the XOR count distributions under different bases of finite field. XOR count of a field element is a simplified metric to estimate the hardware implementation c...
The Design Space of Lightweight Cryptography
Symmetric-key encryption authentication
font style='font-size:12px;'>
2015/12/31
For constrained devices, standard cryptographic algorithms
can be too big, too slow or too energy-consuming. The area of lightweight
cryptography studies new algorithms to overcome these problems. I...
Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices
energy lightweight masking
font style='font-size:12px;'>
2015/12/23
This paper uses an Instruction Set Architecture (ISA) based
statistical energy model of an ARM Cortex-M4 microprocessor to evaluate
the energy consumption of an implementation of AES with different
...
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
APE Authenticated Encryption
font style='font-size:12px;'>
2014/3/5
The domain of lightweight cryptography focuses on cryptographic algorithms for extremely constrained devices. It is very costly to avoid nonce reuse in such environments, because this requires either ...
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
secret-key cryptography
font style='font-size:12px;'>
2013/2/21
Maximum distance separable (MDS) matrices have applications not only in coding theory but also are of great importance in the design of block ciphers and hash functions. It is highly nontrivial to fin...
Lightweight Cryptography - Cryptographic Engineering for a Pervasive World
Lightweight Cryptography Design Embedded Systems
font style='font-size:12px;'>
2009/11/18
Increasingly, everyday items are enhanced to pervasive devices by embedding computing
power and their interconnection leads to Mark Weiser’s famous vision of ubiquitous computing
(ubicomp), which is...