Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications

    Qiang Zhi1, Xiang Jiang1, Hangying Zhang2, Zhengshu Zhou3, Jianguo Ren1, Tong Huang4,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 389-402, 2023, DOI:10.32604/csse.2023.035576

    Abstract The lightweight encryption algorithm based on Add-Rotation-XOR (ARX) operation has attracted much attention due to its high software affinity and fast operation speed. However, lacking an effective defense scheme for physical attacks limits the applications of the ARX algorithm. The critical challenge is how to weaken the direct dependence between the physical information and the secret key of the algorithm at a low cost. This study attempts to explore how to improve its physical security in practical application scenarios by analyzing the masking countermeasures of ARX algorithms and the leakage causes. Firstly, we specify a hierarchical security framework by quantitatively… More >

  • Open Access

    ARTICLE

    Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing

    D. Jerusha*, T. Jaya

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1121-1132, 2022, DOI:10.32604/csse.2022.022997

    Abstract Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in… More >

Displaying 1-10 on page 1 of 2. Per Page