A low area high speed FPGA implementation of AES architecture for cryptography application
Nowadays, a huge amount of digital data is frequently changed among different embedded
devices over wireless communication technologies. Data security is considered an important …
devices over wireless communication technologies. Data security is considered an important …
Analysis of lightweight cryptographic algorithms on iot hardware platform
M El-Hajj, H Mousawi, A Fadlallah - Future Internet, 2023 - mdpi.com
Highly constrained devices that are interconnected and interact to complete a task are being
used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems …
used in a diverse range of new fields. The Internet of Things (IoT), cyber-physical systems …
Privacy and security for resource-constrained IoT devices and networks: research challenges and opportunities
With the exponential growth of the Internet of Things (IoT) and cyber-physical systems
(CPS), a wide range of IoT applications have been developed and deployed in recent years …
(CPS), a wide range of IoT applications have been developed and deployed in recent years …
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices
Blockchain is among the most promising new technologies due to its unique features,
encompassing security, privacy, data integrity, and immutability. Blockchain applications …
encompassing security, privacy, data integrity, and immutability. Blockchain applications …
IESCA: An efficient image encryption scheme using 2-D cellular automata
In the present era of Information Technology (IT), transfer of multimedia data is happening at
a rapid pace. In many Internet-of-Things (IoT) based applications, sensor devices are …
a rapid pace. In many Internet-of-Things (IoT) based applications, sensor devices are …
A high performance scalable fuzzy based modified Asymmetric Heterogene Multiprocessor System on Chip (AHt-MPSOC) reconfigurable architecture
This Ensuing generation of FPGA circuit tolerates the combination of lot of hard and soft
cores as well as devoted accelerators on a chip. The Heterogene Multi-Processor System …
cores as well as devoted accelerators on a chip. The Heterogene Multi-Processor System …
High throughput and area‐efficient FPGA implementation of AES for high‐traffic applications
K Shahbazi, SB Ko - IET Computers & Digital Techniques, 2020 - Wiley Online Library
This study presents a high throughput field‐programmable gate array (FPGA)
implementation of advanced encryption standard‐128 (AES‐128). AES is a well‐known …
implementation of advanced encryption standard‐128 (AES‐128). AES is a well‐known …
Security optimization of resource-constrained internet of healthcare things (IOHT) devices using asymmetric cryptography for blockchain network
V Jayaprakash, AK Tyagi - International Conference on Network Security …, 2021 - Springer
Abstract The term “Internet of Things” is becoming increasingly popular and promising,
ushering in a new era of smarter connectivity across billions of gadgets. In the foreseeable …
ushering in a new era of smarter connectivity across billions of gadgets. In the foreseeable …
An energy-efficient crypto-extension design for RISC-V
W Wang, J Han, X Cheng, X Zeng - Microelectronics Journal, 2021 - Elsevier
With the prevailing of Internet-of-Things (IoT) technology, information security for ever-
growing connected devices is an inevitable issue and gaining more attention. However …
growing connected devices is an inevitable issue and gaining more attention. However …
Hardware implementation of secure lightweight cryptographic designs for IoT applications
The recent expansion of the Internet of Things is creating a new world of smart devices in
which security implications are very significant. Besides the claimed security level, the IoT …
which security implications are very significant. Besides the claimed security level, the IoT …