A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

The metaverse digital environments: a sco** review of the challenges, privacy and security issues

M Tukur, J Schneider, M Househ, AH Dokoro… - Frontiers in big …, 2023 - frontiersin.org
The concept of the “metaverse” has garnered significant attention recently, positioned as the
“next frontier” of the internet. This emerging digital realm carries substantial economic and …

A survey of security issues in wireless sensor networks

Y Wang, G Attebury, B Ramamurthy - 2006 - digitalcommons.unl.edu
Abstract Wireless Sensor Networks (WSNs) are used in many applications in military,
ecological, and health-related areas. These applications often include the monitoring of …

Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis

K Aoki, T Ichikawa, M Kanda, M Matsui, S Moriai… - Selected Areas in …, 2001 - Springer
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size
and 128-, 192-, and 256-bit keys, ie, the same interface specifications as the Advanced …

A survey on wireless sensor network security

J Sen - arxiv preprint arxiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …

Survey and benchmark of block ciphers for wireless sensor networks

YW Law, J Doumen, P Hartel - ACM Transactions on Sensor Networks …, 2006 - dl.acm.org
Cryptographic algorithms play an important role in the security architecture of wireless
sensor networks (WSNs). Choosing the most storage-and energy-efficient block cipher is …

S-box construction based on linear fractional transformation and permutation function

LC Nizam Chew, ES Ismail - Symmetry, 2020 - mdpi.com
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …

A quantitative analysis of reconfigurable coprocessors for multimedia applications

T Miyamori, U Olukotun - Proceedings. IEEE Symposium on …, 1998 - ieeexplore.ieee.org
Recently, computer architectures that combine a reconfigurable (or retargetable)
coprocessor with a general-purpose microprocessor have been proposed. These …

Impossible differential cryptanalysis of reduced-round ARIA and Camellia

WL Wu, WT Zhang, DG Feng - Journal of computer science and technology, 2007 - Springer
This paper studies the security of the block ciphers ARIA and Camellia against impossible
differential cryptanalysis. Our work improves the best impossible differential cryptanalysis of …

S-box: Six-dimensional compound hyperchaotic map and artificial bee colony algorithm

Y Tian, Z Lu - Journal of Systems Engineering and Electronics, 2016 - ieeexplore.ieee.org
Being as unique nonlinear components of block ciphers, substitution boxes (S-boxes)
directly affect the security of the cryptographic systems. It is important and difficult to design …