Implementation of the SPECK Cipher Algorithm on Patient Blood Pressure Data Using the Internet of Things (IoT)
Abstract
References
Recommendations
Security Evaluation of a Lightweight Cipher SPECK against Round Addition DFA
AICCC '18: Proceedings of the 2018 Artificial Intelligence and Cloud Computing ConferenceIn the cloud computing and the internet of things (IoT), various devices are connected. Therefore, to enhance the security of IoT applications, lightweight ciphers, which can be implemented in small area, have attracted attention. SPECK is a typical ...
Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
Advanced Computer Mathematics based Cryptography and Security TechnologiesBiclique cryptanalysis is an attack that improves the computational complexity by finding a biclique which is a kind of bipartite graph. We present a single-key full-round attack of lightweight block ciphers, HIGHT and Piccolo by using biclique ...
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures
Information Security and PrivacyAbstractPlaintext structures are a commonly-used technique for improving differential cryptanalysis. Generally, there are two types of plaintext structures: multiple-differential structures and truncated-differential structures. Both types have been ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/7ddb0e6a-a6eb-4d1f-967a-6e6d6474b2d0/3568231.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 39Total Downloads
- Downloads (Last 12 months)11
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format