ASIC and FPGA comparative study for IoT lightweight hardware security algorithms
Data security, privacy and authenticity are crucial in wireless data transmission. Low power
consumption is the main requirement for any chip design targeting the Internet of Things …
consumption is the main requirement for any chip design targeting the Internet of Things …
Using blockchain for improved video integrity verification
A video record plays a crucial role in providing evidence for crime scenes or road accidents.
However, the main problem with the video record is that it is often vulnerable to various …
However, the main problem with the video record is that it is often vulnerable to various …
Complexity of cyber security architecture for IoT healthcare industry: A comparative study
In recent years a wide range of wearable IoT healthcare applications have been developed
and deployed. The rapid increase in wearable devices allows the transfer of patient …
and deployed. The rapid increase in wearable devices allows the transfer of patient …
FPGA implementation of dynamically reconfigurable IoT security module using algorithm hop**
Abstract Internet of Things (IoT) is a promising technology that is continuously spreading
around the world leading to many challenges facing cryptographic designers who are trying …
around the world leading to many challenges facing cryptographic designers who are trying …
Comparative performance analysis of AES encryption algorithm for various LVCMOS on different FPGAs
Purpose Privacy and security of personal data is the prime concern in any communication.
Security algorithms play a crucial role in privacy preserving and are used extensively …
Security algorithms play a crucial role in privacy preserving and are used extensively …
[HTML][HTML] Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is
designed. The instruction-set consists of both general purpose and specific instructions for …
designed. The instruction-set consists of both general purpose and specific instructions for …
Hardware–software co-design framework for data encryption in image processing systems for the Internet of Things environment
Data protection is a severe constraint in the heterogeneous IoT era. This article presents a
hardware–software cosimulation of AES-128 bit encryption and decryption for IoT edge …
hardware–software cosimulation of AES-128 bit encryption and decryption for IoT edge …
Security improve in ZigBee protocol based on RSA public algorithm in WSN
NA Hasan, AK Farhan - Engineering and Technology …, 2019 - etj.uotechnology.edu.iq
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks.
ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro …
ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro …
[PDF][PDF] In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish
SM Radhi, R Ogla - Iraqi Journal of Computers, Communications, Control …, 2023 - iasj.net
Securing information is difficult in the modern internet era, as terabytes of data are
generated daily online and online transactions occur virtually every second. The current …
generated daily online and online transactions occur virtually every second. The current …
[PDF][PDF] High-performance AES-128 algorithm implementation by FPGA-based SoC for 5G communications
In this research work, a fast and lightweight AES-128 cypher based on the **linx ZCU102
FPGA board is presented, suitable for 5G communications. In particular, both encryption and …
FPGA board is presented, suitable for 5G communications. In particular, both encryption and …