A survey of lightweight stream ciphers for embedded systems
Pervasive computing constitutes a growing trend, aiming to embed smart devices into
everyday objects. The limited resources of these devices and the ever‐present need for …
everyday objects. The limited resources of these devices and the ever‐present need for …
[PDF][PDF] A modified AES based algorithm for image encryption
With the fast evolution of digital data exchange, security information becomes much
important in data storage and transmission. Due to the increasing use of images in industrial …
important in data storage and transmission. Due to the increasing use of images in industrial …
Cryptoraptor: High throughput reconfigurable cryptographic processor
This paper describes a high performance, low power, and highly flexible cryptographic
processor, Cryptoraptor, which is designed to support both today's and tomorrow's …
processor, Cryptoraptor, which is designed to support both today's and tomorrow's …
[图书][B] Statistical trend analysis of physically unclonable functions: An approach via text mining
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …
parameters of materials, waves, or devices into random and unique signals. They have …
[PDF][PDF] Comparison of hardware performance of selected Phase II eSTREAM candidates
K Gaj, G Southern, R Bachimanchi - State of the Art of Stream Ciphers …, 2007 - Citeseer
Abstract Five leading Phase 2 Profile 2 eSTREAM candidates have been implemented in
hardware, targeting two main semiconductor technologies, Field Programmable Gate Arrays …
hardware, targeting two main semiconductor technologies, Field Programmable Gate Arrays …
Evaluating optimized implementations of stream cipher ZUC algorithm on FPGA
L Wang, J Jing, Z Liu, L Zhang, W Pan - International Conference on …, 2011 - Springer
Compared with block ciphers, stream ciphers are more efficient when implemented in
hardware environment, like Field Programma-ble Gate Array (FPGA). In this paper, we …
hardware environment, like Field Programma-ble Gate Array (FPGA). In this paper, we …
Effective uses of FPGAs for brute-force attack on RC4 ciphers
SHM Kwok, EY Lam - IEEE Transactions on Very Large Scale …, 2008 - ieeexplore.ieee.org
This paper presents an effective field-programmable gate array (FPGA)-based hardware
implementation of a parallel key searching system for the brute-force attack on RC4 …
implementation of a parallel key searching system for the brute-force attack on RC4 …
System-level design optimization for security-critical cyber-physical-social systems
Cyber-physical-social systems (CPSS), an emerging computing paradigm, have attracted
intensive attentions from the research community and industry. We are facing various …
intensive attentions from the research community and industry. We are facing various …
Lightweight stream ciphers based on chaos for time and energy constrained IoT applications
O Jallouli, M Chetto, S El Assad - 2022 11th Mediterranean …, 2022 - ieeexplore.ieee.org
The design of efficient and secure cryptographic algorithms is a fundamental problem of
cryptography. Due to the tight cost and constrained resources devices such as Radio …
cryptography. Due to the tight cost and constrained resources devices such as Radio …
Modified RC4 variants and their performance analysis
P Jindal, S Makkar - … and Telecommunications: Proceedings of the Fourth …, 2019 - Springer
Two modified RC4 variants have been discussed in this paper. First, the weaknesses in the
basic RC4 algorithm have been identified and further, the weaknesses have been removed …
basic RC4 algorithm have been identified and further, the weaknesses have been removed …