ASIC and FPGA comparative study for IoT lightweight hardware security algorithms

N Samir, AS Hussein, M Khaled… - Journal of Circuits …, 2019 - World Scientific
Data security, privacy and authenticity are crucial in wireless data transmission. Low power
consumption is the main requirement for any chip design targeting the Internet of Things …

Using blockchain for improved video integrity verification

S Ghimire, JY Choi, B Lee - IEEE Transactions on Multimedia, 2019 - ieeexplore.ieee.org
A video record plays a crucial role in providing evidence for crime scenes or road accidents.
However, the main problem with the video record is that it is often vulnerable to various …

Complexity of cyber security architecture for IoT healthcare industry: A comparative study

AK Alharam, W Elmedany - … on future internet of things and …, 2017 - ieeexplore.ieee.org
In recent years a wide range of wearable IoT healthcare applications have been developed
and deployed. The rapid increase in wearable devices allows the transfer of patient …

FPGA implementation of dynamically reconfigurable IoT security module using algorithm hop**

S Soliman, MA Jaela, AM Abotaleb, Y Hassan… - Integration, 2019 - Elsevier
Abstract Internet of Things (IoT) is a promising technology that is continuously spreading
around the world leading to many challenges facing cryptographic designers who are trying …

Comparative performance analysis of AES encryption algorithm for various LVCMOS on different FPGAs

N Bisht, B Pandey, SK Budhani - World journal of engineering, 2023 - emerald.com
Purpose Privacy and security of personal data is the prime concern in any communication.
Security algorithms play a crucial role in privacy preserving and are used extensively …

[HTML][HTML] Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5

K Shahbazi, M Eshghi, RF Mirzaee - Engineering science and technology …, 2017 - Elsevier
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is
designed. The instruction-set consists of both general purpose and specific instructions for …

Hardware–software co-design framework for data encryption in image processing systems for the Internet of Things environment

K Lata, S Chhabra, S Saini - IEEE Consumer Electronics …, 2021 - ieeexplore.ieee.org
Data protection is a severe constraint in the heterogeneous IoT era. This article presents a
hardware–software cosimulation of AES-128 bit encryption and decryption for IoT edge …

Security improve in ZigBee protocol based on RSA public algorithm in WSN

NA Hasan, AK Farhan - Engineering and Technology …, 2019 - etj.uotechnology.edu.iq
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks.
ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro …

[PDF][PDF] In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish

SM Radhi, R Ogla - Iraqi Journal of Computers, Communications, Control …, 2023 - iasj.net
Securing information is difficult in the modern internet era, as terabytes of data are
generated daily online and online transactions occur virtually every second. The current …

[PDF][PDF] High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications

P Visconti, R Velazquez, S Capoccia… - International Journal of …, 2021 - academia.edu
In this research work, a fast and lightweight AES-128 cypher based on the **linx ZCU102
FPGA board is presented, suitable for 5G communications. In particular, both encryption and …