Results 231 to 240 of about 8,786 (262)
Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation. [PDF]
Subathra S, Thanikaiselvan V.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Lightweight block cipher on VHDL
2017 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), 2017Internet of Things (IoT) will change how we interact with our physical world. It will enable total sensing and controlling of most of the things around us. However, the practical acceptance of IoT from the market determine by the level of confidence perceived by the user.
Mohd Saufy Rohmad +4 more
openaire +1 more source
A Review on Lightweight Block Ciphers
SSRN Electronic Journal, 2020Lightweight cryptography has been very important for the last few years. It became one the most important block of a secure embedded systems because it has been a strong requirement for any resource constrained devices, and has several features like, it consumes only less power, less memory, etc.
Shilpa K, Chinchu A
openaire +1 more source
SFN: A new lightweight block cipher
Microprocessors and Microsystems, 2018Abstract During past few years, some lightweight block ciphers have been proposed. These lightweight block ciphers take single encryption method that either uses Substitution-Permutation (SP) network structure or Feistel network structure to encrypt.
Lang Li, Botao Liu, Yimeng Zhou, Yi Zou
openaire +1 more source
µ2 : A Lightweight Block Cipher
2020This paper presents a 64-bit lightweight block cipher, µ2 with a key size of 80-bit. µ2 is designed based on well-established design paradigms, achieving comparable performance and security when compared against existing state-of-the-art lightweight block ciphers. µ2 is based on the Type-II generalized Feistel structure with a round function, F that is
Wei-Zhu Yeoh +2 more
openaire +1 more source
Improved algebraic attacks on lightweight block ciphers
Journal of Cryptographic Engineering, 2020This paper proposes improved algebraic attacks that are effective for lightweight block ciphers. Concretely, we propose a new framework that leverages on algebraic preprocessing as well as modern SAT solvers to perform algebraic cryptanalysis on block ciphers.
Sze Ling Yeo +2 more
openaire +1 more source
A review of lightweight block ciphers
Journal of Cryptographic Engineering, 2017Embedded systems are deployed in various domains, including industrial installations, critical and nomadic environments, private spaces and public infrastructures. Their operation typically involves access, storage and communication of sensitive and/or critical information that requires protection, making the security of their resources and services an
George Hatzivasilis +3 more
openaire +1 more source
TWIS – A Lightweight Block Cipher
2009A new 128-bit block cipher, TWIS is proposed. It uses key size of 128-bits. The design targets to software environment for resource constrained applications. It is inspired from existing block cipher, CLEFIA. Although the proposed design uses less resources as compared to CLEFIA, it compares favorably with CLEFIA in terms of security provided.
Shri Kant Ojha +3 more
openaire +1 more source
Analysis on Lightweight Block Cipher, KTANTAN
2011 7th International Conference on Information Assurance and Security (IAS), 2011In this research, we present the analysis on Lightweight Block Cipher; KTANTAN. This block cipher consists of three algorithms with block sizes of 32/48/64-bit and utilizes an 80-bit key. NIST Statistical Test Suite is used to determine the randomness of output sequence produced by all algorithms. Nine data categories are applied to generate the output
Nik Azura Nik Abdullah +2 more
openaire +1 more source
Hardware lightweight design of PRESENT block cipher
Materials Today: Proceedings, 2020Abstract In present days the demand for security is increased, so that people gained interest to study on lightweight symmetric ciphers in computing fields like IoT. There are many different security primitives. By that it becomes very difficult to choose the particular primitive for particular application.
G. Sravya +4 more
openaire +1 more source

