Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
P Peris-Lopez, JC Hernandez-Castro… - … Workshop, WISA 2008 …, 2009 - Springer
The design of ultralightweight authentication protocols that conform to low-cost tag
requirements is imperative. This paper analyses the most important proposals (except for …
requirements is imperative. This paper analyses the most important proposals (except for …
Evolutionary algorithms for boolean functions in diverse domains of cryptography
The role of Boolean functions is prominent in several areas including cryptography,
sequences, and coding theory. Therefore, various methods for the construction of Boolean …
sequences, and coding theory. Therefore, various methods for the construction of Boolean …
Lightweight modifications in the Advanced Encryption Standard (AES) for IoT applications: a comparative survey
The Internet of Things is a network of billions of interconnected devices that communicate
over the internet. These massive devices exchange massive amounts of data every second …
over the internet. These massive devices exchange massive amounts of data every second …
AKARI-X: A pseudorandom number generator for secure lightweight systems
In order to obtain more secure and reliable systems, the vast majority of RFID protocols
include a Pseudorandom Number Generator (PRNG) in its design. However, the authors …
include a Pseudorandom Number Generator (PRNG) in its design. However, the authors …
[PDF][PDF] Best S-box amongst differently sized S-boxes based on the avalanche effect in the advance encryption standard algorithm
HM Taher, SQ Abd Al-Rahman… - International Journal of …, 2022 - researchgate.net
Substitution boxes are essential nonlinear modules that are popular in block cipher
algorithms. They also play a significant role in the security area because of their robustness …
algorithms. They also play a significant role in the security area because of their robustness …
Efficient ASIC implementation and analysis of two EPC-C1G2 RFID authentication protocols
H Martin, E San Millán, P Peris-Lopez… - IEEE Sensors …, 2013 - ieeexplore.ieee.org
The Internet of Things refers to the use of services provided by the networked objects
(things) equipped with computational capabilities. A wide range of devices can be attached …
(things) equipped with computational capabilities. A wide range of devices can be attached …
[图书][B] Security and privacy management, techniques, and protocols
Y Maleh - 2018 - books.google.com
The security of information and communication technology is a high priority for any
organization. By examining the current problems and challenges this domain is facing, more …
organization. By examining the current problems and challenges this domain is facing, more …
[PDF][PDF] Lightweight cryptography in radio frequency identification (RFID) systems
PP López, DDJCH Castro… - … Department, Carlos III …, 2008 - academia.edu
This thesis examines the security issues of Radio Frequency Identification (RFID)
technology, one of the most promising technologies in the field of ubiquitous computing …
technology, one of the most promising technologies in the field of ubiquitous computing …
On evolutionary computation methods in cryptography
Evolutionary computation algorithms represent a range of problem-solving techniques
based on principles of biological evolution, like natural selection and genetic inheritance …
based on principles of biological evolution, like natural selection and genetic inheritance …
An efficient authentication protocol for RFID systems resistant to active attacks
P Peris-Lopez, JC Hernandez-Castro… - Emerging Directions in …, 2007 - Springer
RFID technology is a ubiquitous technology, and seems destined to become more a more
ubiquitous. Traditional cryptographic primitives are not supported on low-cost RFID tags …
ubiquitous. Traditional cryptographic primitives are not supported on low-cost RFID tags …