搜索结果: 1-8 共查到“constrained devices”相关记录8条 . 查询时间(0.078 秒)
BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices
blockchain proof of work
2019/5/29
Today server authentication is largely handled through Public Key Infrastructure (PKI) in both the private and the public sector. PKI is established as the defacto standard for Internet communication ...
LIZARD - A Lightweight Stream Cipher for Power-constrained Devices
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
2016/12/8
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0, A5/1, Trivium, Grain) to n/2n/2, where nn denotes the inner state length of the underlying k...
Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices
Arithmetic to Boolean masking Kogge-Stone carry look-ahead adder ARX-based cryptographic algorithm
2016/7/4
A common technique employed for preventing a side channel analysis is boolean masking. However, the application of this scheme is not so straightforward when it comes to block ciphers based on Additio...
The utilization of private Attribute-based credentials (ABC) in everyday life could enable citizens to only partially reveal their identity in economic transactions and communication with public insti...
A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices
Authenticated encryption CAESAR Cryptographic module
2015/12/31
In authenticated encryption schemes, there are two techniques for handling long ciphertexts while working
within the constraints of a low buffer size: Releasing unverified plaintext (RUP) or Producin...
Privacy-Aware Collaboration Among Untrusted Resource Constrained Devices
service providers individuals
2014/12/18
Individuals are increasingly encouraged to share private information with service providers. Privacy is relaxed to increase the utility of the data for the provider. This dissertation offers an altern...
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
post-quantum cryptography code-based cryptography public key encryption scheme efficient implementation embedded devices
2010/9/9
While it is generally believed that due to their large public key sizes code based public key schemes cannot be conveniently used when memory-constrained devices are involved, we propose an approach f...
A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices
universal hash function word oriented LFSRs message authentication codes
2009/6/4
A new multi-linear universal hash family is described. Messages are sequences over a finite
field IFq while keys are sequences over an extension field IFqn. A linear map from IFqn to itself is used...