International audienceThe Internet of Things (IoT) systems are vulnerable to many security threats that may have drastic impacts. Existing cryptographic solutions do not cater for the limitations of resource-constrained IoT devices, nor for real-time requirements of some IoT applications. Therefore, it is essential to design new efficient cipher schemes with low overhead in terms of delay and resource requirements. In this paper, we propose a lightweight stream cipher scheme, which is based, on one hand, on the dynamic key-dependent approach to achieve a high security level, and on the other hand, the scheme involves few simple operations to minimize the overhead. In our approach, cryptographic primitives change in a dynamic lightweight man...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
International audienceThe Internet of Things (IoT) systems are vulnerable to many security threats t...
International audienceSecurity attacks against Internet of Things (IoT) are on the rise and they lea...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
International audienceThe Internet of Things (IoT) systems are vulnerable to many security threats t...
International audienceSecurity attacks against Internet of Things (IoT) are on the rise and they lea...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
International audienceThe design of efficient and secure cryptographic algorithms is a fundamental p...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
Summarization: Pervasive computing constitutes a growing trend, aiming to embed smart devices into e...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...