7   Artículos

 
en línea
Evaristo José Madarro-Capó, Eziel Christians Ramos Piñón, Guillermo Sosa-Gómez and Omar Rojas    
This study describes the implementation of two algorithms in a parallel environment. These algorithms correspond to two statistical tests based on the bit?s independence criterion and the strict avalanche criterion. They are utilized to measure avalanche... ver más
Revista: Computation    Formato: Electrónico

 
en línea
Khai-Minh Ma, Duc-Hung Le, Cong-Kha Pham and Trong-Thuc Hoang    
The security of Internet of Things (IoTs) devices in recent years has created interest in developing implementations of lightweight cryptographic algorithms for such systems. Additionally, open-source hardware and field-programable gate arrays (FPGAs) ar... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Mohammed El-hajj, Hussien Mousawi and Ahmad Fadlallah    
Highly constrained devices that are interconnected and interact to complete a task are being used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems, distributed control systems, vehicular systems, wireless sensor netw... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Kiernan George and Alan J. Michaels    
This paper focuses on a block cipher adaptation of the Galois Extension Fields (GEF) combination technique for PRNGs and targets application in the Internet of Things (IoT) space, an area where the combination technique was concluded as a quality stream ... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Nagendar Yerukala,V Kamakshi Prasad,Allam Apparao     Pág. 11 - 18
For a stream cipher to be secure, the keystreamgenerated by it should be uniformly random with parameter 1/2.Statistical tests check whether the given sequence follow a certainprobability distribution. In this paper, we perform a detailedstatistical anal... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »