LCBC-XTEA: High throughput lightweight cryptographic block cipher model for low-cost RFID systems
The RFID Technology is widely used in many authentications and a sophisticated
application, still having many prospective issues includes privacy and security issues. To …
application, still having many prospective issues includes privacy and security issues. To …
XTEA encryption based novel RFID security protocol
J Yu, G Khan, F Yuan - 2011 24th Canadian Conference on …, 2011 - ieeexplore.ieee.org
RFID technology has been widely used in logistic and authentication applications, but it still
has many potential issues such as the risks of privacy and security. This paper presents a …
has many potential issues such as the risks of privacy and security. This paper presents a …
FPGA based implementation scenarios of TEA Block Cipher
MA Hussain, R Badar - 2015 13th international conference on …, 2015 - ieeexplore.ieee.org
Transmission of sensitive data over some channel is a highly security constrained scenario
and thus demands the application of some encryption algorithm. It is better to implement the …
and thus demands the application of some encryption algorithm. It is better to implement the …
[HTML][HTML] KAMAR: a lightweight feistel block cipher using cellular automata
JKK Jeyaprakash, JG Seka, K Villayutham - Circuits and Systems, 2016 - scirp.org
Wireless Multimedia Sensor Network (WMSN) is an advancement of Wireless Sensor
Network (WSN) that encapsulates WSN with multimedia information like image and video …
Network (WSN) that encapsulates WSN with multimedia information like image and video …
FPGA implementation of a hardware XTEA light encryption engine in co-design computing systems
MH AlMeer - 2017 Seventh International Conference on …, 2017 - ieeexplore.ieee.org
In the era of viruses and hackers targeting high-tech information transported across the
Internet, security is becoming a paramount goal. A cryptographic system is a method of …
Internet, security is becoming a paramount goal. A cryptographic system is a method of …
Effects of cell loss on MPEG video: analytical modeling and empirical validation
MPEG-encoded variable bit rate (VBR) video traffic is expected to incur cell losses during its
transmission over a broadband network. These cell losses introduce distortion into the …
transmission over a broadband network. These cell losses introduce distortion into the …
[HTML][HTML] Programmable SoC for an XTEA encryption algorithm using a co-design environment replication performance approach
MH Al Meer - Journal of Computer and Communications, 2017 - scirp.org
With the rapid development of wired and wireless networks, the security needs within
network systems are becoming increasingly intensive owing to the continuous development …
network systems are becoming increasingly intensive owing to the continuous development …
XTEA Cryptography Implementation in Android Chatting App
I Syamsuddin, E Tungadi, K Kasim… - Journal of Information …, 2020 - repository.poliupg.ac.id
Information security plays a significant role in information society. Cryptography is a key
proof of concept to increasing the security of information assets and has been deployed in …
proof of concept to increasing the security of information assets and has been deployed in …
Performance analysis of TEA block cipher for low power applications
A Ruhan Bevi, S Malarvizhi - Commun. Comput. Inf. Sci, 2012 - Springer
The FPGA based embedded system plays a vital role in the implementation of many
cryptographic applications especially in the field of wireless communication. The security …
cryptographic applications especially in the field of wireless communication. The security …
Comparison of Hand-Written RTL code against High-Level Synthesis for Blowfish and Tiny Encrpytion Algorithm (TEA)
MA Hussain, R Badar, SW Nabi - 2017 - eprints.gla.ac.uk
Cryptography is the backbone of a secure and reliable communication system. Data security
while transmission depends upon the strength of cryptographic algorithm. In this work, Tiny …
while transmission depends upon the strength of cryptographic algorithm. In this work, Tiny …