Ghoreishi, Seyed-Mohsen, Abd Razak, Shukor, Isnin, Ismail Fauzi and Chizari, Hassan ORCID: 0000-0002-6253-1822 (2015) Security evaluation over lightweight cryptographic protocols. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 26-27 Aug. 2014, Kuala Lumpur, Malaysia.
|
Text (Peer reviewed version)
5380 Chizari 2014 Security Evaluation Over Lightweight Cryptographic.pdf - Accepted Version Available under License All Rights Reserved. Download (310kB) | Preview |
Abstract
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research community suffers from non-existence of an integrated pattern to categorize and standardize possible challenges of mentioned concerns. These drawbacks could in turn lead to much confusion for the researchers who are not expert in this research area. Therefore, we paid particular attention to assemble a powerful document to fill this gap between the beginners and the experts. Our final goal is to make other researchers able to classify the challenges over Provably Secure cryptosystems or lightweight ones, analyze the proposed scheme based on the determined components and help them to find better solutions for the future researches.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Uncontrolled Keywords: | Provable Security; Lightweight; Security Evaluation; Attack Model |
Subjects: | Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Schools and Research Institutes > School of Business, Computing and Social Sciences |
Research Priority Areas: | Applied Business & Technology |
Depositing User: | Susan Turner |
Date Deposited: | 14 Feb 2018 14:11 |
Last Modified: | 31 Aug 2023 08:01 |
URI: | https://eprints.glos.ac.uk/id/eprint/5380 |
University Staff: Request a correction | Repository Editors: Update this record