A survey of lightweight stream ciphers for embedded systems

C Manifavas, G Hatzivasilis, K Fysarakis… - Security and …, 2016 - Wiley Online Library
Pervasive computing constitutes a growing trend, aiming to embed smart devices into
everyday objects. The limited resources of these devices and the ever‐present need for …

[PDF][PDF] A modified AES based algorithm for image encryption

M Zeghid, M Machhout, L Khriji, A Baganne… - International Journal of …, 2007 - academia.edu
With the fast evolution of digital data exchange, security information becomes much
important in data storage and transmission. Due to the increasing use of images in industrial …

Cryptoraptor: High throughput reconfigurable cryptographic processor

G Sayilar, D Chiou - 2014 IEEE/ACM International Conference …, 2014 - ieeexplore.ieee.org
This paper describes a high performance, low power, and highly flexible cryptographic
processor, Cryptoraptor, which is designed to support both today's and tomorrow's …

[图书][B] Statistical trend analysis of physically unclonable functions: An approach via text mining

B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra - 2021 - taylorfrancis.com
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …

[PDF][PDF] Comparison of hardware performance of selected Phase II eSTREAM candidates

K Gaj, G Southern, R Bachimanchi - State of the Art of Stream Ciphers …, 2007 - Citeseer
Abstract Five leading Phase 2 Profile 2 eSTREAM candidates have been implemented in
hardware, targeting two main semiconductor technologies, Field Programmable Gate Arrays …

Evaluating optimized implementations of stream cipher ZUC algorithm on FPGA

L Wang, J Jing, Z Liu, L Zhang, W Pan - International Conference on …, 2011 - Springer
Compared with block ciphers, stream ciphers are more efficient when implemented in
hardware environment, like Field Programma-ble Gate Array (FPGA). In this paper, we …

Effective uses of FPGAs for brute-force attack on RC4 ciphers

SHM Kwok, EY Lam - IEEE Transactions on Very Large Scale …, 2008 - ieeexplore.ieee.org
This paper presents an effective field-programmable gate array (FPGA)-based hardware
implementation of a parallel key searching system for the brute-force attack on RC4 …

System-level design optimization for security-critical cyber-physical-social systems

J Zeng, LT Yang, M Lin, Z Shao, D Zhu - ACM Transactions on …, 2017 - dl.acm.org
Cyber-physical-social systems (CPSS), an emerging computing paradigm, have attracted
intensive attentions from the research community and industry. We are facing various …

Lightweight stream ciphers based on chaos for time and energy constrained IoT applications

O Jallouli, M Chetto, S El Assad - 2022 11th Mediterranean …, 2022 - ieeexplore.ieee.org
The design of efficient and secure cryptographic algorithms is a fundamental problem of
cryptography. Due to the tight cost and constrained resources devices such as Radio …

Modified RC4 variants and their performance analysis

P Jindal, S Makkar - … and Telecommunications: Proceedings of the Fourth …, 2019 - Springer
Two modified RC4 variants have been discussed in this paper. First, the weaknesses in the
basic RC4 algorithm have been identified and further, the weaknesses have been removed …