High throughput and low area architectures of secure IoT algorithm for medical image encryption

Z Mishra, B Acharya - Journal of Information Security and Applications, 2020 - Elsevier
The favor that lightweight encryption algorithms have gained over the recent years regarding
data and image security in a resource constrained environment of the smart device sort in …

Throughput/area optimised pipelined architecture for elliptic curve crypto processor

M Imran, M Rashid, AR Jafri… - IET Computers & Digital …, 2019 - Wiley Online Library
A pipelined architecture is proposed in this work to speed up the point multiplication in
elliptic curve cryptography (ECC). This is achieved, at first; by pipelining the arithmetic unit to …

ACryp-Proc: Flexible asymmetric crypto processor for point multiplication

M Imran, M Rashid, AR Jafri, M Najam-ul-Islam - IEEE Access, 2018 - ieeexplore.ieee.org
Flexibility is one of the driving agents for 5G architecture development to incorporate
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …

Low-area and high-speed hardware architectures of LBlock cipher for Internet of Things image encryption

P Singh, B Acharya… - Journal of electronic …, 2022 - spiedigitallibrary.org
Security is becoming an essential field of research as network technology is changing at a
rapid pace. Digital images are transmitted in many modes of communication. This …

Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications

A Aljaedi, SS Jamal, M Rashid, AR Alharbi, M Alotaibi… - Applied Sciences, 2023 - mdpi.com
This paper proposes a novel hardware design for a compact crypto processor devoted to
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …

Novel formulations of M-term overlap-free Karatsuba binary polynomial multipliers and their hardware implementations

M Thirumoorthi, AJ Leigh, M Heidarpur… - … Transactions on Very …, 2023 - ieeexplore.ieee.org
Novel binary polynomial multipliers have been designed using M-term overlap-free
Karatsuba multiplication (OFKM), where is 5–8. The proposed designs were realized in …

Proposal of a lightweight differential power analysis countermeasure method on elliptic curves for low-cost devices

S Gabsi, Y Kortli, V Beroulle, Y Kieffer… - Multimedia Tools and …, 2024 - Springer
Elliptical curves are dedicated for several security applications including Radio Frequency
Identification (RFID) devices, smart cards, bankcards, etc. To guarantee effective security of …

A 4-stage pipelined architecture for point multiplication of binary huff curves

M Rashid, M Imran, AR Jafri… - Journal of Circuits …, 2020 - World Scientific
This work has proposed a 4-stage pipelined architecture to achieve an optimized throughput
over area ratio for point multiplication (PM) computation in binary huff curves (BHC) …

Design and implementation of real-time image acquisition chip based on triple-hybrid encryption system

J Li, Y Luo, F Wang, W Gao - Electronics, 2022 - mdpi.com
With the improved hardware storage capabilities and the rapid development of artificial
intelligence image recognition technology, information is becoming image-oriented …

An area-efficient ECC architecture over GF (2m) for resource-constrained applications

NP Kumar, C Shirisha - AEU-International Journal of Electronics and …, 2020 - Elsevier
Abstract Elliptic Curve Cryptography (ECC), an asymmetric-key cryptographic system,
received extensive research and industry recognition owing to its reliable security with …