A survey of lightweight stream ciphers for embedded systems
Pervasive computing constitutes a growing trend, aiming to embed smart devices into
everyday objects. The limited resources of these devices and the ever‐present need for …
everyday objects. The limited resources of these devices and the ever‐present need for …
A detailed review of blockchain-based applications for protection against pandemic like COVID-19
The recent corona virus disease (COVID-19) pandemic has brought the issues of
technological deficiencies and challenges of security and privacy, validating and …
technological deficiencies and challenges of security and privacy, validating and …
A comprehensive taxonomy of security and privacy issues in RFID
Internet of things (IoT) is made up of many devices like sensors, tags, actuators, mobile
devices, and many more. These devices interact with each other without human interaction …
devices, and many more. These devices interact with each other without human interaction …
Analysis on security and privacy guidelines: RFID-based IoT applications
The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency
Identification (RFID), which can be used to track single or multiple objects. This technology …
Identification (RFID), which can be used to track single or multiple objects. This technology …
Performance evaluation of cryptographic ciphers on IoT devices
P Singh, K Deshpande - arxiv preprint arxiv:1812.02220, 2018 - arxiv.org
With the advent of Internet of Things (IoT) and the increasing use of application-based
processors, security infrastructure needs to be examined on some widely-used IoT hardware …
processors, security infrastructure needs to be examined on some widely-used IoT hardware …
[PDF][PDF] Encrypted information hiding using audio steganography and audio cryptography
N Sinha, A Bhowmick, B Kishore - International Journal of Computer …, 2015 - Citeseer
With the growing importance of the internet, secure transmission of information is crucial.
Steganography and cryptography helps in providing this much needed data confidentiality …
Steganography and cryptography helps in providing this much needed data confidentiality …
Developments in Secure Random Number Generators
Designs of pseudo‐random number generators have been divided into two areas of
applications: computer simulation and computer security. The requirement for computer …
applications: computer simulation and computer security. The requirement for computer …
Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG
A Bhowmick, N Sinha, RV Arjunan… - … on Inventive Systems …, 2017 - ieeexplore.ieee.org
The growing importance of information security over recent years has prompted
development of secure encryption algorithms. Most of the traditional algorithms such as AES …
development of secure encryption algorithms. Most of the traditional algorithms such as AES …
Comparative Analysis of LFSR and NLFSR based Lightweight Stream Ciphers for Use in IoT
MU Bokhari, S Afzal, B Hanafi… - 2023 10th International …, 2023 - ieeexplore.ieee.org
Almost everything is linked to machines at this time because human existence is undergoing
an information revolution that will make it easier for people to survive. One such technology …
an information revolution that will make it easier for people to survive. One such technology …
[PDF][PDF] Modification of RC4 algorithm by using two state tables and initial state factorial
SM Searan, AM Sagheer - International Journal of Computer …, 2016 - mecs-press.org
RC4 algorithm is one of the most significant stream and symmetric cryptographic algorithms,
it is simple and used in various commercial products, it has many weaknesses such as a …
it is simple and used in various commercial products, it has many weaknesses such as a …