A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments
JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …
for various areas of applications. These algorithms are the backbone of data protection and …
The metaverse digital environments: a sco** review of the challenges, privacy and security issues
The concept of the “metaverse” has garnered significant attention recently, positioned as the
“next frontier” of the internet. This emerging digital realm carries substantial economic and …
“next frontier” of the internet. This emerging digital realm carries substantial economic and …
A survey of security issues in wireless sensor networks
Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …
ecological, and health-related areas. These applications often include the monitoring of …
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size
and 128-, 192-, and 256-bit keys, ie, the same interface specifications as the Advanced …
and 128-, 192-, and 256-bit keys, ie, the same interface specifications as the Advanced …
A survey on wireless sensor network security
J Sen - arxiv preprint arxiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …
community due their wide range of applications. Due to distributed nature of these networks …
Survey and benchmark of block ciphers for wireless sensor networks
Cryptographic algorithms play an important role in the security architecture of wireless
sensor networks (WSNs). Choosing the most storage-and energy-efficient block cipher is …
sensor networks (WSNs). Choosing the most storage-and energy-efficient block cipher is …
S-box construction based on linear fractional transformation and permutation function
LC Nizam Chew, ES Ismail - Symmetry, 2020 - mdpi.com
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …
A quantitative analysis of reconfigurable coprocessors for multimedia applications
T Miyamori, U Olukotun - Proceedings. IEEE Symposium on …, 1998 - ieeexplore.ieee.org
Recently, computer architectures that combine a reconfigurable (or retargetable)
coprocessor with a general-purpose microprocessor have been proposed. These …
coprocessor with a general-purpose microprocessor have been proposed. These …
Impossible differential cryptanalysis of reduced-round ARIA and Camellia
WL Wu, WT Zhang, DG Feng - Journal of computer science and technology, 2007 - Springer
This paper studies the security of the block ciphers ARIA and Camellia against impossible
differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of …
differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of …
S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm
Y Tian, Z Lu - Journal of Systems Engineering and Electronics, 2016 - ieeexplore.ieee.org
Being as unique nonlinear components of block ciphers, substitution boxes (S-boxes)
directly affect the security of the cryptographic systems. It is important and difficult to design …
directly affect the security of the cryptographic systems. It is important and difficult to design …