[HTML][HTML] A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays

K Kumar, KR Ramkumar, A Kaur - … of King Saud University-Computer and …, 2022 - Elsevier
The security of data is a major concern in this digital era. In general text and image data are
well protected with the help of existing standards, meanwhile, securing voice …

A design of power-efficient AES algorithm on Artix-7 FPGA for green communication

K Kumar, A Kaur, KR Ramkumar… - 2021 International …, 2021 - ieeexplore.ieee.org
With the development and growth in industries, the society and the environment are facing
two huge problems. Advancement in technology have raised the problem of communication …

A design implementation and comparative analysis of advanced encryption standard (AES) algorithm on FPGA

K Kumar, KR Ramkumar, A Kaur - 2020 8th International …, 2020 - ieeexplore.ieee.org
As the technology is getting advanced continuously the problem for the security of data is
also increasing. The hackers are equipped with new advanced tools and techniques to …

Hardware implementation of cancellable biometric systems

S Ibrahim, MG Egila, H Shawkey… - … Conference on I …, 2020 - ieeexplore.ieee.org
The use of biometrics in security applications may be vulnerable to several challenges of
hacking. Thus, the emergence of cancellable biometrics becomes a suitable solution to this …

Complexity of cyber security architecture for IoT healthcare industry: A comparative study

AK Alharam, W Elmedany - … on future internet of things and …, 2017 - ieeexplore.ieee.org
In recent years a wide range of wearable IoT healthcare applications have been developed
and deployed. The rapid increase in wearable devices allows the transfer of patient …

A lightweight cryptography technique with random pattern generation

N Thangamani, M Murugappan - Wireless Personal Communications, 2019 - Springer
The lightweight cryptography (LWC) is an interesting research area in the field of information
security. So, different lightweight mechanisms have been developed in the existing works for …

A survey on hardware implementation of cryptographic algorithms using field programmable gate array

K Kumar, KR Ramkumar, A Kaur… - 2020 IEEE 9th …, 2020 - ieeexplore.ieee.org
In the past recent years the idea towards secure data communication is increasing day by
day. The secure communication is being achieved by applying various cryptographic …

Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time

NAA Mohd, AYA Ashawesh - Journal of Physics: Conference …, 2021 - iopscience.iop.org
Computer, Internet technology have grown exponentially, and constant evolution until today.
The usage of digital data such as text, images, audio, animation and videos are commonly …

Chaotic clock driven cryptographic chip: Towards a DPA resistant AES processor

AA El-Moursy, AM Darya, AS Elwakil… - … on Emerging Topics …, 2020 - ieeexplore.ieee.org
Designing a tamper-resistant microchip for small embedded systems is one of the urgent
demands of the computing community nowadays due to the immense security challenges …

Differentially 4-uniform permutations with the best known nonlinearity from butterflies

S Fu, X Feng, B Wu - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Many block ciphers use permutations defined over the finite field $\mathbb {F} _ {2^{2k}} $
with low differential uniformity, high nonlinearity, and high algebraic degree to provide …