Zobrazeno 1 - 10
of 118
pro vyhledávání: '"Reza Azarderakhsh"'
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 31:157-161
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 19:1-20
Advances in quantum computing have urged the need for cryptographic algorithms that are low-power, low-energy, and secure against attacks that can be potentially enabled. For this post-quantum age, different solutions have been studied. Code-based cr
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 30:794-802
Publikováno v:
IEEE Transactions on Circuits and Systems I: Regular Papers. 69:2490-2501
This survey is on forward-looking, emerging security concerns in post-quantum era, i.e., the implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) competition and thus the visions, insights, and discussions can be used as a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::323bf28a1abbd835dba2f8e07f364bb5
http://arxiv.org/abs/2305.13544
http://arxiv.org/abs/2305.13544
This survey is the first work on the current standard for lightweight cryptography, standardized in 2023 and used for security of embedded systems. Security issues as well as implementations and side-channel attacks for this lightweight standard by N
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0c2d629e1e0510a0f385a459d5fb1764
https://doi.org/10.36227/techrxiv.22970855
https://doi.org/10.36227/techrxiv.22970855
Publikováno v:
IEEE Transactions on Circuits and Systems II: Express Briefs. 69:2276-2280
Publikováno v:
IEEE Transactions on Reliability. :1-11
Autor:
Alvaro Cintas Canto, Ausmita Sarker, Jasmin Kaur, Mehran Mozaffari Kermani, Reza Azarderakhsh
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. :1-6
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 10:514-519
The cryptographic algorithm QARMA is a family of lightweight tweakable block ciphers targeted at applications such as memory encryption and construction of keyed hash functions. This lightweight block cipher utilizes a substitution permutation networ