Multiplierless chaotic pseudo random number generators
This paper presents a multiplierless based FPGA implementation for six different chaotic
Pseudo Random Number Generators (PRNGs) that are based on: Chua, modified Lorenz …
Pseudo Random Number Generators (PRNGs) that are based on: Chua, modified Lorenz …
Design and efficient implementation of a chaos-based stream cipher
We designed and implemented a stream cipher cryptosystem based on an efficient chaotic
generator of finite computing precision (N= 32). The proposed structure of the chaotic …
generator of finite computing precision (N= 32). The proposed structure of the chaotic …
A high‐speed and low‐latency hardware implementation of RC4 cryptographic algorithm
C Sun, W Liu, J Cheng, N Sun, Z Peng… - … Journal of Circuit …, 2023 - Wiley Online Library
In this letter, a high‐speed and low‐latency Ron Rivest‐4 (RC4) encryption algorithm is
designed based on SMIC 14 nm process. Since the key issue of limiting the throughput of …
designed based on SMIC 14 nm process. Since the key issue of limiting the throughput of …
[LIVRE][B] Statistical trend analysis of physically unclonable functions: An approach via text mining
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …
parameters of materials, waves, or devices into random and unique signals. They have …
An effective RC4 stream cipher
TDB Weerasinghe - 2013 IEEE 8th international conference on …, 2013 - ieeexplore.ieee.org
RC4 is the most widely used stream cipher around. A lot of modifications of RC4 cipher can
be seen in open literature. Most of them enhance the secrecy of the cipher and the security …
be seen in open literature. Most of them enhance the secrecy of the cipher and the security …
A secure phase-encrypted IEEE 802.15. 4 transceiver design
With the proliferation of Internet of Things (IoT), the IEEE 802.15. 4 physical layer is
becoming increasingly popular due to its low power consumption. However, secure data …
becoming increasingly popular due to its low power consumption. However, secure data …
High-efficiency parallel cryptographic accelerator for real-time guaranteeing dynamic data security in embedded systems
Z Zhang, X Wang, Q Hao, D Xu, J Zhang, J Liu, J Ma - Micromachines, 2021 - mdpi.com
Dynamic data security in embedded systems is raising more and more concerns in
numerous safety-critical applications. In particular, the data exchanges in embedded …
numerous safety-critical applications. In particular, the data exchanges in embedded …
RC4-2S: RC4 stream cipher with two state tables
One of the most important symmetric cryptographic algorithms is Rivest Cipher 4 (RC4)
stream cipher which can be applied to many security applications in real time security …
stream cipher which can be applied to many security applications in real time security …
New implementations of the WG stream cipher
H El-Razouk, A Reyhani-Masoleh… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
This paper presents two new hardware designs of the Welch-Gong (WG)-128 cipher, one for
the multiple output WG (MOWG) version, and the other for the single output version WG …
the multiple output WG (MOWG) version, and the other for the single output version WG …
Lightweight cryptographic algorithms on resource-constrained devices
TX Meng, W Buchanan - 2020 - preprints.org
As the embedded device and internet of things (IoTs) concept prevalent in today's world,
there is an increasing demand for the security and performance requirements on deploying …
there is an increasing demand for the security and performance requirements on deploying …