High throughput implementation of SHA3 hash algorithm on field programmable gate array (FPGA)

S El Moumni, M Fettach, A Tragha - Microelectronics journal, 2019 - Elsevier
Cryptographic hash function is an essential element in sensitive communications, such as
banking, military and health. It ensures secure communication by checking data integrity …

[HTML][HTML] The future of low-end motes in the Internet of Things: A prospective paper

D Oliveira, M Costa, S Pinto, T Gomes - Electronics, 2020 - mdpi.com
Undeniably, the Internet of Things (IoT) ecosystem continues to evolve at a breakneck pace,
exceeding all growth expectations and ubiquity barriers. From sensor to cloud, this giant …

Field Programmable Gate Array based elliptic curve Menezes‐Qu‐Vanstone key agreement protocol realization using Physical Unclonable Function and true random …

NN Anandakumar, MS Hashmi… - IET Circuits, Devices & …, 2022 - Wiley Online Library
The trust, authenticity and integrity of Internet‐of‐Things (IoT) systems are heavily reliant on
Physical Unclonable Functions (PUFs) and True random number generators (TRNGs). The …

[PDF][PDF] High-performance FPGA implementation of the secure hash algorithm 3 for single and multi-message processing

F Assad, M Fettach, F El Otmani… - International Journal of …, 2022 - academia.edu
The secure hash function has become the default choice for information security, especially
in applications that require data storing or manipulation. Consequently, optimized …

[PDF][PDF] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography

Y Lu, D Zhao - management, 2022 - aimspress.com
Designing a secure authentication scheme for session initial protocol (SIP) over internet
protocol (VoIP) networks remains challenging. In this paper, we revisit the protocol of Zhang …

IPsec cryptography for data packets security within vpn tunneling networks communications

KF Mahmmod, MM Azeez… - … Conference on Electrical …, 2020 - ieeexplore.ieee.org
The internet today allows us to communicate with anyone from anywhere in the world. This
kind of access is available to legitimate as well as illegitimate users. Therefore, data security …

An efficient implementation of FPGA based high speed IPSec (AH/ESP) core

M Rao, T Newe, E Omerdic, G Dooly… - … Journal of Internet …, 2018 - inderscienceonline.com
The IPSec is used to secure the IP traffic. The IPSec protocol was designed to fulfil the need
to provide security at the network level, so that all the higher-layer protocols in the OSI model …

[HTML][HTML] Future Internet of Things: Connecting the Unconnected World and Things Based on 5/6G Networks and Embedded Technologies

S Messaoud, R Amdouni, A Albouchi… - Internet of Things …, 2023 - intechopen.com
Abstract Undeniably, the Internet of Things (IoT) ecosystem keeps on advancing at a fast
speed, far above all predictions for growth and ubiquity. From sensor to cloud, this massive …

Rekonfigurierbare Hardwarekomponenten im Kontext von Cloud-Architekturen

O Knodel - 2018 - tud.qucosa.de
Abstract (DE) Rekonfigurierbare Schaltkreise wie Field Programmable Gate Arrays (FPGAs)
stellen seit Jahren für viele Unternehmen eine Schlüsseltechnologie zur …

[图书][B] A Framework for the Performance Analysis and Tuning of Virtual Private Networks

FS Perez - 2018 - search.proquest.com
With the rising trend of personal devices like laptops and smartphones being used in
businesses and significant enterprises, the concern for preserving security arises. In addition …