Showing 1 - 20 results of 56 for search 'optimal encryption and authentication', query time: 0.13s Refine Results
  1. 1
  2. 2

    Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices by Gabriela Cagua, Valerie Gauthier-Umana, Carlos Lozano-Garzon

    Published 2025-01-01
    “…Selected as the winner of the National Institute of Standards and Technology (NIST) competition for lightweight encryption algorithms, ASCON ensures confidentiality and integrity through authenticated encryption with associated data (AEAD) tailored for resource-constrained environments. …”
    Get full text
    Article
  3. 3

    AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme by Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mostafizar Rahman, Kosei Sakamoto

    Published 2025-03-01
    “… In this paper, we introduce AETHER, an authenticated encryption scheme that achieves ultra-high throughput and low energy consumption, supporting a 256- bit key and a 128-bit tag. …”
    Get full text
    Article
  4. 4
  5. 5

    Distributed and efficient identity authentication based on consortium blockchain by Yao Ying, Yan Yong, Guo Shaoyong, Xiong Ao, Zhang Wang

    Published 2022-03-01
    “…Features and asymmetric encryption methods are used to improve the security and stability of the user identity authentication system. …”
    Get full text
    Article
  6. 6
  7. 7

    Full lifecycle security management scheme for terminal keys under power IoT by Wang Hui, Yuan Jiahui, Shi Zhentong, Fang Mu

    Published 2025-01-01
    “…The performance analysis shows that compared to the traditional access authentication and key management scheme based on logical key hierarchy, the scheme of this paper optimizes the terminal computation, reduces the computational overhead and simplifies the key update process. …”
    Get full text
    Article
  8. 8

    Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework by Xinyue Zhang, Daoguang Mu, Wenzheng Zhang, Xinfeng Dong

    Published 2025-03-01
    “…In this paper, we present MLOL, a novel AEAD algorithm based on the LOL framework. MLOL combines authenticated encryption with optimizations to the LFSR structure to enhance both security and efficiency. …”
    Get full text
    Article
  9. 9

    Research on Information Security Transmission of Port Multi-Thread Equipment Based on Advanced Encryption Standard and Preprocessing Optimization by Zhixin Xia, Xiaolei Yang, Afei Li, Yongshan Liu, Siyuan He

    Published 2024-12-01
    “…On this basis, in order to reduce the cost overhead generated by AES encryption, this paper used the pre-computed method of optimizing S-boxes and Mixcolumn matrices to be applied to the multithreaded control framework, which improved the computation rate of AES, and then it improved the efficiency of the information transmission in the multithreaded control process. …”
    Get full text
    Article
  10. 10

    A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes by Swetha S, Joe Prathap P M

    Published 2025-06-01
    “…The modified Al-Biruni earth radius search optimization (MBERSO) algorithm is used to make the best keys for this EC-EC encryption scheme. …”
    Get full text
    Article
  11. 11

    Research on Lightweight Dynamic Security Protocol for Intelligent In-Vehicle CAN Bus by Yuanhao Wang, Yinan Xu, Zhiquan Liu, Suya Liu, Yujing Wu

    Published 2025-05-01
    “…Each Electronic Control Unit (ECU) node independently performs compression, encryption, and authentication while periodically updating its keys to enhance system security and strengthen defense capabilities. …”
    Get full text
    Article
  12. 12

    A Novel Polynomial Activation for Audio Classification Using Homomorphic Encryption by Linh Nguyen, Quoc Bao Phan, Lan Zhang, Tuy Tan Nguyen

    Published 2025-01-01
    “…Homomorphic encryption (HE) addresses this problem by allowing direct computation on encrypted data without decryption. …”
    Get full text
    Article
  13. 13

    Analysis of Encrypted Network Traffic for Enhancing Cyber-security in Dynamic Environments by Faeiz Alserhani

    Published 2024-12-01
    “…The Tree-based Spider-Net Multipath (TBSNM) methodology is utilized, while an Advanced Encryption Standard (AES) technique is used to authenticate users. …”
    Get full text
    Article
  14. 14

    A Low-Cost PKC-Based RFID Mutual Authentication Protocol by Lili Wei, Qingkuan Dong, Wenxiu Ding

    Published 2013-10-01
    “…Based on the PKC-based RFID authentication protocol cryptoGPS which costs the least resource currently,a low-cost mutual authentication protocol which has a flexible key-management and can realize a mutual authentication was proposed.It adopted a new key-management scheme,an optimized fast Rabin encryption algorithm,low Hamming weight modulus and a lightweight stream cipher algorithm Grain V1,moreover,a new low-cost multiplier was designed to achieve the modulus multiplication on large numbers.The security analysis and simulation experiments carried out on Design Complier with Smic 0.25 μm technique show that this scheme is secure enough and in which the tag just needs 4 530 gates,it is suitable for RFID system.…”
    Get full text
    Article
  15. 15

    Network Efficient Hierarchical Authentication Algorithm for Secure Communication in IoT and IoE by Abhiram Sharma, R. Suganya, P. B. Krishna, Rudra Raj, Raja Kumar Murugesan

    Published 2024-01-01
    “…By dividing data into 42-bit blocks, it optimizes the encryption process, offering faster, more efficient data protection than conventional approaches. …”
    Get full text
    Article
  16. 16

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  17. 17

    Software and hardware co-design of lightweight authenticated ciphers ASCON for the internet of things by Jing WANG, Lesheng HE, Zhonghong LI, Luchi LI, Hang YANG

    Published 2022-12-01
    “…ASCON was the most promising algorithm to become an international standard in the 2021 NIST lightweight authenticated encryption call for proposals.The algorithm was designed to achieve the best performance in IoT resource-constrained environments, and there was no hardware IP core implementation based on this algorithm in the open literature.A software-hardware collaborative implementation method of ASCON was proposed, which improved the speed and reduced the memory footprint of ASCON in IoT security authentication applications through hardware means such as S-box optimization, prior calculation and advanced pipeline design.As a comparison, ASCON has been transplanted on the common IoT embedded processor platform.The results showed that the described method was more than 7.9 times faster, while the memory footprint was reduced by at least 90%.The schemes can be used for the design and implementation of IoT security application-specific integrated circuits or SoCs.…”
    Get full text
    Article
  18. 18

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the identity authentication stage, based on the residual Hash lemma and the signcryptic property, the message was signed and encrypted in one logical step at the same time, and the interaction flow of dot multiplication and Hash operation with low frequency was proposed to complete the access authentication performed by the group leader on behalf of the group members. …”
    Get full text
    Article
  19. 19

    A lightweight lattice-based group signcryption authentication scheme for Internet of things by XU Chuan, AI Xinghao, WANG Shanshan, ZHAO Guofeng, HAN Zhenzhen

    Published 2024-04-01
    “…In the identity authentication stage, based on the residual Hash lemma and the signcryptic property, the message was signed and encrypted in one logical step at the same time, and the interaction flow of dot multiplication and Hash operation with low frequency was proposed to complete the access authentication performed by the group leader on behalf of the group members. …”
    Get full text
    Article
  20. 20

    A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash by Umar Mujahid, M. Najam-ul-Islam, Atif Raza Jafri, Qurat-ul-Ain, M. Ali Shami

    Published 2016-02-01
    “…Since the RFID uses wireless channel for communication with its associated devices, there should be some optimal encryption methods to secure the communicating data from adversaries. …”
    Get full text
    Article