Universiti Teknologi Malaysia Institutional Repository

Security evaluation over lightweight cryptographic protocols

Ghoreishi, S. M. and Razak, S. A. and Isnin, I. F. and Chizari, H. (2015) Security evaluation over lightweight cryptographic protocols. In: 2014 4th International Symposium on Biometrics and Security Technologies, ISBAST 2014, 26 - 27 August 2014, Kuala Lumpur, Malaysia.

[img]
Preview
PDF
208kB

Official URL: http://dx.doi.org/10.1109/ISBAST.2014.7013116

Abstract

Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research community suffers from non-existence of an integrated pattern to categorize and standardize possible challenges of mentioned concerns. These drawbacks could in turn lead to much confusion for the researchers who are not expert in this research area. Therefore, we paid particular attention to assemble a powerful document to fill this gap between the beginners and the experts. Our final goal is to make other researchers able to classify the challenges over Provably Secure cryptosystems or lightweight ones, analyze the proposed scheme based on the determined components and help them to find better solutions for the future researches.

Item Type:Conference or Workshop Item (Paper)
Uncontrolled Keywords:Attack Model, lightweight
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions:Computing
ID Code:59464
Deposited By: Haliza Zainal
Deposited On:18 Jan 2017 01:50
Last Modified:05 Apr 2022 01:11

Repository Staff Only: item control page