[HTML][HTML] A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays
The security of data is a major concern in this digital era. In general text and image data are
well protected with the help of existing standards, meanwhile, securing voice …
well protected with the help of existing standards, meanwhile, securing voice …
A design of power-efficient AES algorithm on Artix-7 FPGA for green communication
K Kumar, A Kaur, KR Ramkumar… - 2021 International …, 2021 - ieeexplore.ieee.org
With the development and growth in industries, the society and the environment are facing
two huge problems. Advancement in technology have raised the problem of communication …
two huge problems. Advancement in technology have raised the problem of communication …
A design implementation and comparative analysis of advanced encryption standard (AES) algorithm on FPGA
As the technology is getting advanced continuously the problem for the security of data is
also increasing. The hackers are equipped with new advanced tools and techniques to …
also increasing. The hackers are equipped with new advanced tools and techniques to …
Hardware implementation of cancellable biometric systems
S Ibrahim, MG Egila, H Shawkey… - … Conference on I …, 2020 - ieeexplore.ieee.org
The use of biometrics in security applications may be vulnerable to several challenges of
hacking. Thus, the emergence of cancellable biometrics becomes a suitable solution to this …
hacking. Thus, the emergence of cancellable biometrics becomes a suitable solution to this …
Complexity of cyber security architecture for IoT healthcare industry: A comparative study
AK Alharam, W Elmedany - … on future internet of things and …, 2017 - ieeexplore.ieee.org
In recent years a wide range of wearable IoT healthcare applications have been developed
and deployed. The rapid increase in wearable devices allows the transfer of patient …
and deployed. The rapid increase in wearable devices allows the transfer of patient …
A lightweight cryptography technique with random pattern generation
N Thangamani, M Murugappan - Wireless Personal Communications, 2019 - Springer
The lightweight cryptography (LWC) is an interesting research area in the field of information
security. So, different lightweight mechanisms have been developed in the existing works for …
security. So, different lightweight mechanisms have been developed in the existing works for …
A survey on hardware implementation of cryptographic algorithms using field programmable gate array
In the past recent years the idea towards secure data communication is increasing day by
day. The secure communication is being achieved by applying various cryptographic …
day. The secure communication is being achieved by applying various cryptographic …
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
NAA Mohd, AYA Ashawesh - Journal of Physics: Conference …, 2021 - iopscience.iop.org
Computer, Internet technology have grown exponentially, and constant evolution until today.
The usage of digital data such as text, images, audio, animation and videos are commonly …
The usage of digital data such as text, images, audio, animation and videos are commonly …
Chaotic clock driven cryptographic chip: Towards a DPA resistant AES processor
Designing a tamper-resistant microchip for small embedded systems is one of the urgent
demands of the computing community nowadays due to the immense security challenges …
demands of the computing community nowadays due to the immense security challenges …
Differentially 4-uniform permutations with the best known nonlinearity from butterflies
S Fu, X Feng, B Wu - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Many block ciphers use permutations defined over the finite field $\mathbb {F} _ {2^{2k}} $
with low differential uniformity, high nonlinearity, and high algebraic degree to provide …
with low differential uniformity, high nonlinearity, and high algebraic degree to provide …