Security evaluation over lightweight cryptographic protocols

Ghoreishi, Seyed-Mohsen, Abd Razak, Shukor, Isnin, Ismail Fauzi and Chizari, Hassan ORCID: 0000-0002-6253-1822 (2015) Security evaluation over lightweight cryptographic protocols. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 26-27 Aug. 2014, Kuala Lumpur, Malaysia.

Text (Peer reviewed version)
5380 Chizari 2014 Security Evaluation Over Lightweight Cryptographic.pdf - Accepted Version
Available under License All Rights Reserved.

Download (310kB) | Preview


Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research community suffers from non-existence of an integrated pattern to categorize and standardize possible challenges of mentioned concerns. These drawbacks could in turn lead to much confusion for the researchers who are not expert in this research area. Therefore, we paid particular attention to assemble a powerful document to fill this gap between the beginners and the experts. Our final goal is to make other researchers able to classify the challenges over Provably Secure cryptosystems or lightweight ones, analyze the proposed scheme based on the determined components and help them to find better solutions for the future researches.

Item Type: Conference or Workshop Item (Paper)
Additional Information: © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Uncontrolled Keywords: Provable Security; Lightweight; Security Evaluation; Attack Model
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Schools and Research Institutes > School of Business, Computing and Social Sciences
Research Priority Areas: Applied Business & Technology
Depositing User: Susan Turner
Date Deposited: 14 Feb 2018 14:11
Last Modified: 31 Aug 2023 08:01

University Staff: Request a correction | Repository Editors: Update this record

University Of Gloucestershire

Bookmark and Share

Find Us On Social Media:

Social Media Icons Facebook Twitter Google+ YouTube Pinterest Linkedin

Other University Web Sites

University of Gloucestershire, The Park, Cheltenham, Gloucestershire, GL50 2RH. Telephone +44 (0)844 8010001.