Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol

P Peris-Lopez, JC Hernandez-Castro… - … Workshop, WISA 2008 …, 2009 - Springer
The design of ultralightweight authentication protocols that conform to low-cost tag
requirements is imperative. This paper analyses the most important proposals (except for …

Evolutionary algorithms for boolean functions in diverse domains of cryptography

S Picek, C Carlet, S Guilley, JF Miller… - Evolutionary …, 2016 - ieeexplore.ieee.org
The role of Boolean functions is prominent in several areas including cryptography,
sequences, and coding theory. Therefore, various methods for the construction of Boolean …

Lightweight modifications in the Advanced Encryption Standard (AES) for IoT applications: a comparative survey

RS Salman, AK Farhan, A Shakir - … International Conference on …, 2022 - ieeexplore.ieee.org
The Internet of Things is a network of billions of interconnected devices that communicate
over the internet. These massive devices exchange massive amounts of data every second …

AKARI-X: A pseudorandom number generator for secure lightweight systems

H Martín, E San Millán, L Entrena… - 2011 IEEE 17th …, 2011 - ieeexplore.ieee.org
In order to obtain more secure and reliable systems, the vast majority of RFID protocols
include a Pseudorandom Number Generator (PRNG) in its design. However, the authors …

[PDF][PDF] Best S-box amongst differently sized S-boxes based on the avalanche effect in‎ the advance encryption standard algorithm

HM Taher, SQ Abd Al-Rahman… - International Journal of …, 2022 - researchgate.net
Substitution boxes are essential nonlinear modules that are popular in block cipher
algorithms. They also play a significant role in the security area because of their robustness …

Efficient ASIC implementation and analysis of two EPC-C1G2 RFID authentication protocols

H Martin, E San Millán, P Peris-Lopez… - IEEE Sensors …, 2013 - ieeexplore.ieee.org
The Internet of Things refers to the use of services provided by the networked objects
(things) equipped with computational capabilities. A wide range of devices can be attached …

[图书][B] Security and privacy management, techniques, and protocols

Y Maleh - 2018 - books.google.com
The security of information and communication technology is a high priority for any
organization. By examining the current problems and challenges this domain is facing, more …

[PDF][PDF] Lightweight cryptography in radio frequency identification (RFID) systems

PP López, DDJCH Castro… - … Department, Carlos III …, 2008 - academia.edu
This thesis examines the security issues of Radio Frequency Identification (RFID)
technology, one of the most promising technologies in the field of ubiquitous computing …

On evolutionary computation methods in cryptography

S Picek, M Golub - 2011 Proceedings of the 34th International …, 2011 - ieeexplore.ieee.org
Evolutionary computation algorithms represent a range of problem-solving techniques
based on principles of biological evolution, like natural selection and genetic inheritance …

An efficient authentication protocol for RFID systems resistant to active attacks

P Peris-Lopez, JC Hernandez-Castro… - Emerging Directions in …, 2007 - Springer
RFID technology is a ubiquitous technology, and seems destined to become more a more
ubiquitous. Traditional cryptographic primitives are not supported on low-cost RFID tags …