A survey of lightweight stream ciphers for embedded systems

C Manifavas, G Hatzivasilis, K Fysarakis… - Security and …, 2016 - Wiley Online Library
Pervasive computing constitutes a growing trend, aiming to embed smart devices into
everyday objects. The limited resources of these devices and the ever‐present need for …

A detailed review of blockchain-based applications for protection against pandemic like COVID-19

MM Khubrani, S Alam - … Computing Electronics and Control), 2021 - telkomnika.uad.ac.id
The recent corona virus disease (COVID-19) pandemic has brought the issues of
technological deficiencies and challenges of security and privacy, validating and …

A comprehensive taxonomy of security and privacy issues in RFID

A Kumar, AK Jain, M Dua - Complex & Intelligent Systems, 2021 - Springer
Internet of things (IoT) is made up of many devices like sensors, tags, actuators, mobile
devices, and many more. These devices interact with each other without human interaction …

Analysis on security and privacy guidelines: RFID-based IoT applications

HA Abdulghani, NA Nijdam, D Konstantas - Ieee Access, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency
Identification (RFID), which can be used to track single or multiple objects. This technology …

Performance evaluation of cryptographic ciphers on IoT devices

P Singh, K Deshpande - arxiv preprint arxiv:1812.02220, 2018 - arxiv.org
With the advent of Internet of Things (IoT) and the increasing use of application-based
processors, security infrastructure needs to be examined on some widely-used IoT hardware …

[PDF][PDF] Encrypted information hiding using audio steganography and audio cryptography

N Sinha, A Bhowmick, B Kishore - International Journal of Computer …, 2015 - Citeseer
With the growing importance of the internet, secure transmission of information is crucial.
Steganography and cryptography helps in providing this much needed data confidentiality …

Developments in Secure Random Number Generators

LY Deng, N Kumar, HHS Lu… - Wiley Interdisciplinary …, 2025 - Wiley Online Library
Designs of pseudo‐random number generators have been divided into two areas of
applications: computer simulation and computer security. The requirement for computer …

Permutation-Substitution architecture based image encryption algorithm using middle square and RC4 PRNG

A Bhowmick, N Sinha, RV Arjunan… - … on Inventive Systems …, 2017 - ieeexplore.ieee.org
The growing importance of information security over recent years has prompted
development of secure encryption algorithms. Most of the traditional algorithms such as AES …

Comparative Analysis of LFSR and NLFSR based Lightweight Stream Ciphers for Use in IoT

MU Bokhari, S Afzal, B Hanafi… - 2023 10th International …, 2023 - ieeexplore.ieee.org
Almost everything is linked to machines at this time because human existence is undergoing
an information revolution that will make it easier for people to survive. One such technology …

[PDF][PDF] Modification of RC4 algorithm by using two state tables and initial state factorial

SM Searan, AM Sagheer - International Journal of Computer …, 2016 - mecs-press.org
RC4 algorithm is one of the most significant stream and symmetric cryptographic algorithms,
it is simple and used in various commercial products, it has many weaknesses such as a …