Multiplierless chaotic pseudo random number generators

AA Rezk, AH Madian, AG Radwan… - AEU-International Journal …, 2020 - Elsevier
This paper presents a multiplierless based FPGA implementation for six different chaotic
Pseudo Random Number Generators (PRNGs) that are based on: Chua, modified Lorenz …

Design and efficient implementation of a chaos-based stream cipher

MA Taha, SE Assad, A Queudet… - … Journal of Internet …, 2017 - inderscienceonline.com
We designed and implemented a stream cipher cryptosystem based on an efficient chaotic
generator of finite computing precision (N= 32). The proposed structure of the chaotic …

A high‐speed and low‐latency hardware implementation of RC4 cryptographic algorithm

C Sun, W Liu, J Cheng, N Sun, Z Peng… - … Journal of Circuit …, 2023 - Wiley Online Library
In this letter, a high‐speed and low‐latency Ron Rivest‐4 (RC4) encryption algorithm is
designed based on SMIC 14 nm process. Since the key issue of limiting the throughput of …

[LIVRE][B] Statistical trend analysis of physically unclonable functions: An approach via text mining

B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra - 2021 - taylorfrancis.com
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …

An effective RC4 stream cipher

TDB Weerasinghe - 2013 IEEE 8th international conference on …, 2013 - ieeexplore.ieee.org
RC4 is the most widely used stream cipher around. A lot of modifications of RC4 cipher can
be seen in open literature. Most of them enhance the secrecy of the cipher and the security …

A secure phase-encrypted IEEE 802.15. 4 transceiver design

AK Nain, J Bandaru, MA Zubair… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT), the IEEE 802.15. 4 physical layer is
becoming increasingly popular due to its low power consumption. However, secure data …

High-efficiency parallel cryptographic accelerator for real-time guaranteeing dynamic data security in embedded systems

Z Zhang, X Wang, Q Hao, D Xu, J Zhang, J Liu, J Ma - Micromachines, 2021 - mdpi.com
Dynamic data security in embedded systems is raising more and more concerns in
numerous safety-critical applications. In particular, the data exchanges in embedded …

RC4-2S: RC4 stream cipher with two state tables

MM Hammood, K Yoshigoe, AM Sagheer - … , Robotics, Automations and …, 2013 - Springer
One of the most important symmetric cryptographic algorithms is Rivest Cipher 4 (RC4)
stream cipher which can be applied to many security applications in real time security …

New implementations of the WG stream cipher

H El-Razouk, A Reyhani-Masoleh… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper presents two new hardware designs of the Welch-Gong (WG)-128 cipher, one for
the multiple output WG (MOWG) version, and the other for the single output version WG …

Lightweight cryptographic algorithms on resource-constrained devices

TX Meng, W Buchanan - 2020 - preprints.org
As the embedded device and internet of things (IoTs) concept prevalent in today's world,
there is an increasing demand for the security and performance requirements on deploying …