Entropy sources based on silicon chips: True random number generator and physical unclonable function
Entropy is a measure of uncertainty or randomness. It is the foundation for almost all
cryptographic systems. True random number generators (TRNGs) and physical unclonable …
cryptographic systems. True random number generators (TRNGs) and physical unclonable …
ASIC and FPGA comparative study for IoT lightweight hardware security algorithms
N Samir, AS Hussein, M Khaled… - Journal of Circuits …, 2019 - World Scientific
Data security, privacy and authenticity are crucial in wireless data transmission. Low power
consumption is the main requirement for any chip design targeting the Internet of Things …
consumption is the main requirement for any chip design targeting the Internet of Things …
A lossless compression and encryption mechanism for remote monitoring of ECG data using Huffman coding and CBC-AES
Biomedical signal processing provides a cross-disciplinary international forum through
which research on signal and images measurement and analysis of clinical medicine and …
which research on signal and images measurement and analysis of clinical medicine and …
A comparative analysis of AES common modes of operation
S Almuhammadi, I Al-Hejri - 2017 IEEE 30th Canadian …, 2017 - ieeexplore.ieee.org
With the rapid increase of the Internet users, network security becomes very essential.
Cryptography plays a major role in network security. However, cryptographic systems …
Cryptography plays a major role in network security. However, cryptographic systems …
[PDF][PDF] Comparative study of several operation modes of AES algorithm for encryption ECG biomedical signal
Biomedical signal processing provides a cross-disciplinary international forum through
which research on signal and images measurement and analysis in clinical medicine as …
which research on signal and images measurement and analysis in clinical medicine as …
Design and hardware implementation of a simplified DAG-based blockchain and new AES-CBC algorithm for IoT security
SW Lee, KB Sim - Electronics, 2021 - mdpi.com
Recently, to enhance the security of the Internet of Things (IoT), research on blockchain-
based encryption algorithms has been actively conducted. However, because blockchains …
based encryption algorithms has been actively conducted. However, because blockchains …
Security enhancement of AES-CBC and its performance evaluation using the avalanche effect
HT Assafli, IA Hashim - 2020 3rd International Conference on …, 2020 - ieeexplore.ieee.org
The security of communication systems is becoming a significant concern with the increase
in computational power. High-security cryptographic algorithms are required to protect the …
in computational power. High-security cryptographic algorithms are required to protect the …
On securing persistent state in intermittent computing
We present the experimental evaluation of different security mechanisms applied to
persistent state in intermittent computing. Whenever executions become intermittent …
persistent state in intermittent computing. Whenever executions become intermittent …
[PDF][PDF] An enhanced lossless compression with cryptography hybrid mechanism for ECG biomedical signal monitoring
Due to their use in daily life situation, demand for remote health applications and e-health
monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy …
monitoring equipment is growing quickly. In this phase, for fast diagnosis and therapy …
Software-Defined Ultrasonic Communication System With OFDM for Secure Video Monitoring
Ultrasonic communication is a desirable method for information transfer through solid
channels such as metallic bars, plates, or pipes by overcoming the physical barriers that …
channels such as metallic bars, plates, or pipes by overcoming the physical barriers that …