With the proliferation of the internet of things (IoT) and device-to-device (D2D) communications enabled by the boom of mobile computing technology, secure high-speed communication has now become indispensable in our daily life. This is especially true when potentially private data are being continually sensed by and communicated among mobile devices as they exist in a world of interconnected inanimate objects, which is also one of the main themes of the upcoming 5G revolution. As the amount of data to be secured for high-speed communications is vast, there is a need to ensure that the block ciphers used for encryption are deployed without incurring significant computational cost. In this paper, we present fast implementations of recent ind...
Abstract—In this paper we investigate hardware implemen-tations of ciphering algorithms, SNOW 3G and...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
Attacks on data stored in mobile devices are increasingly getting more efficient and successful, esp...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
Abstract. Embedded microcontroller applications often experience mul-tiple limiting constraints: mem...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
Abstract. Hardware implementations of block ciphers have been inten-sively evaluated for years. The ...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
Abstract. The design of lightweight block ciphers has been a very ac-tive research topic over the la...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Abstract—In this paper we investigate hardware implemen-tations of ciphering algorithms, SNOW 3G and...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
Attacks on data stored in mobile devices are increasingly getting more efficient and successful, esp...
With the advent of the Internet of Things (IoT) and cloud computing technologies, vast amounts of da...
With the emergence of IoT and cloud computing technologies, massive data are generated from various ...
The Internet of Things (IoT) consists of an ever-growing network of wireless-connected electronic de...
Abstract. Embedded microcontroller applications often experience mul-tiple limiting constraints: mem...
In the era of IoT and ubiquitous computing, the collection and communication of sensitive data is in...
Abstract. Hardware implementations of block ciphers have been inten-sively evaluated for years. The ...
Abstract. The technical analysis used in determining which of the NESSIE candidates will be selected...
The technical analysis used in determining which of the NESSIE candidates will be selected as a stan...
GPU is widely used in various applications that require huge computational power. In this paper, we ...
Abstract. The design of lightweight block ciphers has been a very ac-tive research topic over the la...
© Springer International Publishing Switzerland 2016. Security mechanisms to protect our systems and...
Summarization: Embedded systems are deployed in various domains, including industrial installations,...
Abstract—In this paper we investigate hardware implemen-tations of ciphering algorithms, SNOW 3G and...
In this paper we present GPU based implementations of popular encryption schemes Blowfish and the Ad...
Attacks on data stored in mobile devices are increasingly getting more efficient and successful, esp...