[HTML][HTML] A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays

K Kumar, KR Ramkumar, A Kaur - … of King Saud University-Computer and …, 2022 - Elsevier
The security of data is a major concern in this digital era. In general text and image data are
well protected with the help of existing standards, meanwhile, securing voice …

ELmD: A pipelineable authenticated encryption and its hardware implementation

L Bossuet, N Datta, C Mancillas-López… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Authenticated encryption schemes which resist misuse of nonce at some desired level of
privacy are two-pass or Mac-then-Encrypt constructions (inherently inefficient but provide full …

Smart crop growth monitoring based on system adaptivity and edge AI

CH Huang, BW Chen, YJ Lin, JX Zheng - IEEE Access, 2022 - ieeexplore.ieee.org
This work proposes a smart crop growth monitoring system that contains an adaptive
cryptography engine to ensure the security of sensor data and an edge artificial intelligence …

[HTML][HTML] Biometric key generation and multi round AES crypto system for improved security

S Nagaraju, R Nagendra, S Balasundaram… - Measurement …, 2023 - Elsevier
To improve the reliability and system performance many transformation works have been
investigated using various contexts. In general, numerical global key models and pseudo …

Image encryption using enhanced DCT transform for frequency domain applications

B Ganesh, D Ganesh, MS Kumar… - MATEC Web of …, 2024 - matec-conferences.org
improving system performance and reliability. Key leaks and inadequate key strength are
common issues with numerical global key models and public block cipher algorithms that …

Data sniffing over an open VLC channel

I Marin-Garcia, AM Ramirez-Aguilera… - … Networks and Digital …, 2016 - ieeexplore.ieee.org
The feasibility of using Visible Light Communications (VLC) technology is a reality
nowadays. As this technology is being inserted into the mass market, deliberation about the …

[PDF][PDF] FPGA Implementation of High-Performance s-box Model and Bit-level Masking for AES Cryptosystem

BM Krishna, C Santhosh, SK Khasimbee - IJEER, 2022 - ijeer.forexjournal.co.in
The inadequacies inherent in the existing cryptosystem have driven the development of
exploit the benefits of cipher key characteristics and associated key generation tasks in …

Optimization of area and delay for implementation of the composite field advanced encryption standard S-box

X Zhang, N Wu, F Zhou, F Ge - Journal of Circuits, Systems and …, 2016 - World Scientific
Among different implementations of the Advanced Encryption Standard (AES) S-box, the
implementation based on composite field arithmetic (CFA) has the smallest size. In this …

Exploration of the High-Efficiency Hardware Architecture of SM4-CCM for IoT Applications

R Chen, B Li - Electronics, 2022 - mdpi.com
The widespread use of the internet of things (IoT) is due to the value of the data collected by
IoT devices. These IoT devices generate, process, and exchange large amounts of safety …

Security in wireless sensor networks for health monitoring helmet with anomaly detection using power analysis and probabilistic model

B Panja, Z Scott, P Meharia - 2014 IEEE Conference on …, 2014 - ieeexplore.ieee.org
Litigation faced by the NFL has called for better prevention and understanding of
concussions and other sports injuries. To achieve this, sports officials have turned to …