In today's world, systems generate and exchange digital data frequently and face a much broader range of threats than in the past. Within the context of this unsafe ecosystem, it is crucial to protect the data in a quick and secure way. In this paper, it is proposed that a lightweight block cipher algorithm called LWE in the purpose of having an encryption algorithm that is light enough for restricted/limited hardware environments and secure enough to endure primal cryptanalysis attacks. The length of blocks to be encrypted is set to 64 bits and the key length is defined as 64 bits. It is targeted for IoT systems with low-end microcontrollers and body sensor area devices. The performance and security aspects of LWE are evaluated with well-k...
Smart medical devices will only be smart if they also in-clude technology to provide security and pr...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
In recent times, security for hardware and software appliances has proved to be a quintessential ext...
The advancement of the Internet of Things (IoT) has promoted the development of embedded devices. It...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
The wireless body area network has developed into a new technology that is prominent for improving h...
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) tech...
The internet connected modern world raises many security and privacy concerns. Cryptography is one o...
Lightweight cryptography is a new concept that refers to a method of bettering data security through...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
The internet of things (IoT) revolution has been sparked by the exponential increase in connected de...
The Internet of Things (IoT) has begun to acquire place in our lives quietly and gradually thanks to...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
Telemedicine platforms have emerged as one of the most harnessed studies in recent years, especially...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
Smart medical devices will only be smart if they also in-clude technology to provide security and pr...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
In recent times, security for hardware and software appliances has proved to be a quintessential ext...
The advancement of the Internet of Things (IoT) has promoted the development of embedded devices. It...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
The wireless body area network has developed into a new technology that is prominent for improving h...
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) tech...
The internet connected modern world raises many security and privacy concerns. Cryptography is one o...
Lightweight cryptography is a new concept that refers to a method of bettering data security through...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
The internet of things (IoT) revolution has been sparked by the exponential increase in connected de...
The Internet of Things (IoT) has begun to acquire place in our lives quietly and gradually thanks to...
Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, t...
Telemedicine platforms have emerged as one of the most harnessed studies in recent years, especially...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
Smart medical devices will only be smart if they also in-clude technology to provide security and pr...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
In recent times, security for hardware and software appliances has proved to be a quintessential ext...