Review and open issues of cryptographic algorithms in cyber security
… where we discuss the challenges and comparative analysis of algorithms in terms of … in
cryptographic algorithms. Furthermore, our study provides a literature review, challenges and …
cryptographic algorithms. Furthermore, our study provides a literature review, challenges and …
[PDF][PDF] Cryptographic algorithms: a review of the literature, weaknesses and open challenges
… Since a complete study of cryptographic algorithms' weaknesses and open challenges
has not been done so far, we decided to present a detailed analysis of SYM and ASYM in this …
has not been done so far, we decided to present a detailed analysis of SYM and ASYM in this …
Lightweight cryptography algorithms for IoT devices: open issues and challenges
S Ganiev, Z Khudoykulov - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
… open issues and problems that exist in the design and implementation of LWC (Lightweight
Cryptography) algorithms … in the implementation of LWC algorithms in different environments, …
Cryptography) algorithms … in the implementation of LWC algorithms in different environments, …
Why does cryptographic software fail? A case study and open problems
… Cryptographic algorithms and protocols are an important building block for a secure …
One noteworthy challenge of implementing cryptographic software is to defend against side-…
One noteworthy challenge of implementing cryptographic software is to defend against side-…
On security challenges and open issues in Internet of Things
… barely support any encryption algorithm, the design of the encryption algorithms, secure
communication protocols and even architectural security designs all need to be reconsidered. …
communication protocols and even architectural security designs all need to be reconsidered. …
Lightweight cryptography algorithms for internet of things enabled networks: An overview
… Unsecured IoT devices open gateway for attacks. Unprotected and vulnerable devices, at …
challenges in IoT cryptography. Section 4 presents the lightweight cryptographic algorithms, its …
challenges in IoT cryptography. Section 4 presents the lightweight cryptographic algorithms, its …
[PDF][PDF] Comparative study of cryptography algorithms and its' applications
… and challenge issues of different symmetric algorithms, such as - AES, DES, Blowfish and
RSA … It's a standout amongst other known open key cryptosystems [17]. RSA is an asymmetric …
RSA … It's a standout amongst other known open key cryptosystems [17]. RSA is an asymmetric …
[图书][B] Chaos-based cryptography: Theory, algorithms and applications
… and open issues or hot topics are reviewed and analyzed. … will contribute to a better
understanding of all topics, research, … of the concepts, issues, problems, trends, challenges and …
understanding of all topics, research, … of the concepts, issues, problems, trends, challenges and …
Research issues related to cryptography algorithms and key generation for smart grid: A survey
… cryptography algorithms and related key generation for smart grid application. On the basis
of survey several research issue … So authenticity and authorization is a big challenge in Smart …
of survey several research issue … So authenticity and authorization is a big challenge in Smart …
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
… -of-art of lightweight cryptographic primitives which include … We analyze many lightweight
cryptographic algorithms based … We also discussed open issues in terms of cipher structure, …
cryptographic algorithms based … We also discussed open issues in terms of cipher structure, …
相关搜索
- lightweight cryptography algorithms
- cryptography algorithms smart grid
- cryptography algorithms comparative study
- survey challenges and solutions encryption algorithms
- standard cryptographic algorithms
- hybrid cryptographic algorithm
- cryptography algorithm cost communication
- cloud security cryptographic algorithms
- comparative analysis of cryptographic algorithms
- cyber security cryptographic algorithms
- cryptography algorithms iot devices
- cryptography algorithms iot sensor nodes
- cryptography algorithms data security and authentication
- context of communication cryptographic algorithms
- cryptography algorithms key generation
- open issues and challenges iot devices