Explore chapters and articles related to this topic
A Study on Privacy-Preserving Models Using Blockchain Technology for IoT
Published in Neeraj Kumar, N. Gayathri, Md. Arafatur Rahman, B. Balamurugan, Blockchain, Big Data and Machine Learning, 2020
Syed Muzamil Basha, J. Janet, S. Balakrishnan
A lightweight security saving ring mark plot exchanges by true clients [6]. This mark’s ensures that data has not been changed, as though it was secured by a carefully designed seal that is broken if the substance were adjusted. A ring mark enables an underwriter to sign a message secretly. It uses twofold encryption of information utilizing lightweight encryption calculations (ARX figures) and open encryption plans (Diffie–Hellman key trade procedure). Making use of these both procedures together will ensure the security, protection, and secrecy of client’s information through IoT gadgets.
Applicability of Lightweight Stream Cipher in Crowd Computing: A Detailed Survey and Analysis
Published in Khan Pathan Al-Sakib, Crowd-Assisted Networking and Computing, 2018
Subhrajyoti Deb, Rohit Upadhya, Bubu Bhuyan
ARX ciphers use modular add, rotate, and XOR operations. A large number of symmetric primitives use modular ARX, and also it has been used in the cryptographic field for the last 20 years [4]. ARX is used in different block and stream ciphers, like Skein, BLAKE, CubeHash, and Salsa20.
A Review on Evolution of Symmetric Key Block Ciphers and Their Applications
Published in IETE Journal of Education, 2020
Several directions in the design of lightweight cryptographic systems [17] are proposed in the literature that includes ARX-based designs and bit-sliced-S-Box-based designs or simpler key schedules. ARX stands for simple operations such as modular addition (A), bitwise rotation (R), and exclusive-OR (X).
Africa
China
Japan