Emerging security mechanisms for medical cyber physical systems
The following decade will witness a surge in remote health-monitoring systems that are
based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) …
based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) …
[책][B] Wireless security and cryptography: specifications and implementations
As the use of wireless devices becomes widespread, so does the need for strong and
secure transport protocols. Even with this intensified need for securing systems, using …
secure transport protocols. Even with this intensified need for securing systems, using …
Efficient and high-performance parallel hardware architectures for the AES-GCM
M Mozaffari-Kermani… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Since its acceptance as the adopted symmetric-key algorithm, the Advanced Encryption
Standard (AES) and its recently standardized authentication Galois/Counter Mode (GCM) …
Standard (AES) and its recently standardized authentication Galois/Counter Mode (GCM) …
A lightweight high-performance fault detection scheme for the advanced encryption standard using composite fields
M Mozaffari-Kermani… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
The faults that accidently or maliciously occur in the hardware implementations of the
Advanced Encryption Standard (AES) may cause erroneous encrypted/decrypted output …
Advanced Encryption Standard (AES) may cause erroneous encrypted/decrypted output …
FPGA implementation of AES algorithm for high speed applications
The main objective of this paper is to design and implement High throughput, area efficient
AES encryption algorithm on FPGA for security purposes. The high speed and area …
AES encryption algorithm on FPGA for security purposes. The high speed and area …
Compact and efficient structure of 8-bit S-box for lightweight cryptography
B Rashidi - Integration, 2021 - Elsevier
In this paper, we design an inversion-based S-box with better hardware implementation than
the AES S-box with similar cryptographic properties. The proposed S-box computation …
the AES S-box with similar cryptographic properties. The proposed S-box computation …
Securing AES designs against power analysis attacks: a survey
TB Singha, RP Palathinkal… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the advent of Internet of Things (IoT), the call for hardware security has been seriously
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
demanding due to the risks of side-channel attacks from adversaries. Advanced encryption …
Construction of optimum composite field architecture for compact high-throughput aes s-boxes
In this work, we derive three novel composite field arithmetic (CFA) Advanced Encryption
Standard (AES) S-boxes of the field GF (((2 2) 2) 2). The best construction is selected after a …
Standard (AES) S-boxes of the field GF (((2 2) 2) 2). The best construction is selected after a …
[Retracted] Optimization of AES‐128 Encryption Algorithm for Security Layer in ZigBee Networking of Internet of Things
Z Luo, K Shen, R Hu, Y Yang… - Computational …, 2022 - Wiley Online Library
With the rapid development of network and communication technology, the interaction of
various information data is more and more frequent, and people pay more and more …
various information data is more and more frequent, and people pay more and more …
Efficient fault diagnosis schemes for reliable lightweight cryptographic ISO/IEC standard CLEFIA benchmarked on ASIC and FPGA
M Mozaffari-Kermani… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Lightweight block ciphers are essential for providing low-cost confidentiality to sensitive
constrained applications. Nonetheless, this confidentiality does not guarantee their reliability …
constrained applications. Nonetheless, this confidentiality does not guarantee their reliability …