A hybrid MCDM approach of selecting lightweight cryptographic cipher based on ISO and NIST lightweight cryptography security requirements for internet of health …
L Ning, Y Ali, H Ke, S Nazir, Z Huanli - IEEE Access, 2020 - ieeexplore.ieee.org
The most serious challenges currently faced by healthcare environment is the decision
making related to the installation of the most suitable and appropriate lightweight …
making related to the installation of the most suitable and appropriate lightweight …
High throughput novel architectures of TEA family for high speed IoT and RFID applications
Z Mishra, B Acharya - Journal of Information Security and Applications, 2021 - Elsevier
The current era of ubiquitous computing has led to the emergence of a sub-domain in
cryptography called Lightweight Cryptography, which deals with imparting adequate security …
cryptography called Lightweight Cryptography, which deals with imparting adequate security …
[Retracted] Renovated XTEA Encoder Architecture‐Based Lightweight Mutual Authentication Protocol for RFID and Green Wireless Sensor Network Applications
M Nagarajan, M Rajappa… - Wireless …, 2022 - Wiley Online Library
Wireless sensor networks find applications everywhere in day to day activities right from
attendance entry systems to healthcare monitoring systems. The evolution of the Internet of …
attendance entry systems to healthcare monitoring systems. The evolution of the Internet of …
Cryptography algorithms for improving the security of cloud‐based internet of things
In today's fast‐paced society, the Internet of Things (IoT) is revolutionizing businesses by
bridging the gap between the digital and physical realms. This transformative technology …
bridging the gap between the digital and physical realms. This transformative technology …
Secure image encryption using high throughput architectures of PRINT cipher for radio frequency identification applications
With the enhancement of technology, data security has become incredibly significant.
Nowadays, images and vital information are used in real-time, and high throughput …
Nowadays, images and vital information are used in real-time, and high throughput …
Novel hardware architectures of improved-LEA lightweight cipher for IoT applications
Abstract The Internet of Things (IoTs), smart cards, and other ubiquitous computing devices
have grown exponentially since last decade. These devices demand new security and …
have grown exponentially since last decade. These devices demand new security and …
An Efficient Low-Latency and High Throughput LED Cipher Architecture for IoT Security on a Hardware Platform
MS Naik, DK Sreekantha, KV Sairam - SN Computer Science, 2024 - Springer
The recent growth of the Internet of Things (IoT) has created many significant security
consequences in the modern age of electronic gadgets. In addition to their stated extent of …
consequences in the modern age of electronic gadgets. In addition to their stated extent of …
Block of Data Encryption Using the Modified XTEA Algorithm.
AAA Abdulkadhim, AS Mahmood… - … des Systèmes d' …, 2024 - search.ebscohost.com
Abstract The Internet of Things (IoT) employs various devices with varying hardware
capabilities, including those with restricted resources like wireless sensor networks and …
capabilities, including those with restricted resources like wireless sensor networks and …
[PDF][PDF] Efficient hardware implementation for lightweight Loong algorithm using FPGA
Recently low-resource devices such as radio frequency identification (RFID), internet of
things (IoT), and wireless sensor networks (WSN) using lightweight cryptography (LWC) to …
things (IoT), and wireless sensor networks (WSN) using lightweight cryptography (LWC) to …
FID-MA XTEA: Cost-Effective RFID-Mutual Authentication Design Using XTEA Security on FPGA Platform
R Anusha, V Shastrimath - International Journal of Electronics and …, 2021 - yadda.icm.edu.pl
RFID systems are one of the essential technologies and used many diverse applications.
The security and privacy are the primary concern in RFID systems which are overcome by …
The security and privacy are the primary concern in RFID systems which are overcome by …