International audienceSecurity attacks are constantly on the rise leading to drastic consequences. Several security services are required more than ever to prevent both passive and active attacks such as Data Confidentiality (DC). A DC security service is typically based on a strong symmetric cipher algorithm. However, some of today’s applications, such as real-time applications and those running on constrained devices, require efficient lightweight cipher schemes that can achieve a good balance between the security level and system performance. Recently, a set of lightweight cryptographic algorithms has been proposed to that end, which is based on a dynamic key approach. The dynamic structure enables the reduction of the number of rounds t...
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed netw...
International audienceThe Internet of Things (IoT) systems are vulnerable to many security threats t...
International audienceThe impact of confidentiality and privacy breaches are more pronounced when de...
International audienceSecurity attacks are constantly on the rise leading to drastic consequences. S...
International audienceSecurity attacks against Internet of Things (IoT) are on the rise and they lea...
International audienceThe protection of multimedia content has become a key area of research, since ...
International audienceCryptography is the central component of a large number of security solutions....
In this thesis, effective and robust cryptographic schemes were proposed to overcome the current sec...
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmi...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...
The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynam...
International audienceRecently, the security of existing symmetric <a href="https://www.sciencedirec...
In modern security models, cryptography plays a funda-mental role in protecting data integrity and c...
Conference of 7th International Conference on Ad Hoc Networks, AdHocHets 2015 ; Conference Date: 1 S...
As our dependency on the digital world increases, our private information becomes widely visible and...
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed netw...
International audienceThe Internet of Things (IoT) systems are vulnerable to many security threats t...
International audienceThe impact of confidentiality and privacy breaches are more pronounced when de...
International audienceSecurity attacks are constantly on the rise leading to drastic consequences. S...
International audienceSecurity attacks against Internet of Things (IoT) are on the rise and they lea...
International audienceThe protection of multimedia content has become a key area of research, since ...
International audienceCryptography is the central component of a large number of security solutions....
In this thesis, effective and robust cryptographic schemes were proposed to overcome the current sec...
Modern applications, especially real time applications, are hungry for high-speed end-to-end transmi...
Copyright © 2015 ISSR Journals. This is an open access article distributed under the Creative Common...
The biggest challenge for symmetric cryptosystems is to replace their static substitution with dynam...
International audienceRecently, the security of existing symmetric <a href="https://www.sciencedirec...
In modern security models, cryptography plays a funda-mental role in protecting data integrity and c...
Conference of 7th International Conference on Ad Hoc Networks, AdHocHets 2015 ; Conference Date: 1 S...
As our dependency on the digital world increases, our private information becomes widely visible and...
Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed netw...
International audienceThe Internet of Things (IoT) systems are vulnerable to many security threats t...
International audienceThe impact of confidentiality and privacy breaches are more pronounced when de...