Title
Security evaluation over lightweight cryptographic protocols
Abstract
Due to the applicability of a wide range of cryptosystems in recently proposed applications, a large variety of cryptographic schemes have been developed. It can be claimed that proposing a cryptographic protocol to satisfy security and efficiency requirements is one of the significant challenging issues. Nevertheless, cryptographic research community suffers from non-existence of an integrated pattern to categorize and standardize possible challenges of mentioned concerns. These drawbacks could in turn lead to much confusion for the researchers who are not expert in this research area. Therefore, we paid particular attention to assemble a powerful document to fill this gap between the beginners and the experts. Our final goal is to make other researchers able to classify the challenges over Provably Secure cryptosystems or lightweight ones, analyze the proposed scheme based on the determined components and help them to find better solutions for the future researches.
Year
DOI
Venue
2014
10.1109/ISBAST.2014.7013116
Biometrics and Security Technologies
Keywords
Field
DocType
cryptographic protocols,efficiency requirement,lightweight cryptographic protocols,security evaluation,security requirement,Attack Model,Provable Security,Security Evaluation,lightweight
Computational hardness assumption,Attack model,Cryptographic protocol,Cryptography,Computer science,Computer security,Cryptographic primitive,Controlled Cryptographic Item,Security of cryptographic hash functions,Computer security model
Conference
ISBN
Citations 
PageRank 
978-1-4799-6443-7
0
0.34
References 
Authors
17
4
Name
Order
Citations
PageRank
Seyed-Mohsen Ghoreishi101.01
Abd Razak, S.241.77
Ismail Fauzi ISnin3394.76
Hassan Chizari4526.20