High throughput and low area architectures of secure IoT algorithm for medical image encryption
Z Mishra, B Acharya - Journal of Information Security and Applications, 2020 - Elsevier
The favor that lightweight encryption algorithms have gained over the recent years regarding
data and image security in a resource constrained environment of the smart device sort in …
data and image security in a resource constrained environment of the smart device sort in …
Throughput/area optimised pipelined architecture for elliptic curve crypto processor
A pipelined architecture is proposed in this work to speed up the point multiplication in
elliptic curve cryptography (ECC). This is achieved, at first; by pipelining the arithmetic unit to …
elliptic curve cryptography (ECC). This is achieved, at first; by pipelining the arithmetic unit to …
ACryp-Proc: Flexible asymmetric crypto processor for point multiplication
Flexibility is one of the driving agents for 5G architecture development to incorporate
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …
enhanced mobile broad band, machine type communication (MTC), and ultra-reliable MTC …
Low-area and high-speed hardware architectures of LBlock cipher for Internet of Things image encryption
Security is becoming an essential field of research as network technology is changing at a
rapid pace. Digital images are transmitted in many modes of communication. This …
rapid pace. Digital images are transmitted in many modes of communication. This …
Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications
This paper proposes a novel hardware design for a compact crypto processor devoted to
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …
Novel formulations of M-term overlap-free Karatsuba binary polynomial multipliers and their hardware implementations
Novel binary polynomial multipliers have been designed using M-term overlap-free
Karatsuba multiplication (OFKM), where is 5–8. The proposed designs were realized in …
Karatsuba multiplication (OFKM), where is 5–8. The proposed designs were realized in …
Proposal of a lightweight differential power analysis countermeasure method on elliptic curves for low-cost devices
Elliptical curves are dedicated for several security applications including Radio Frequency
Identification (RFID) devices, smart cards, bankcards, etc. To guarantee effective security of …
Identification (RFID) devices, smart cards, bankcards, etc. To guarantee effective security of …
A 4-stage pipelined architecture for point multiplication of binary huff curves
This work has proposed a 4-stage pipelined architecture to achieve an optimized throughput
over area ratio for point multiplication (PM) computation in binary huff curves (BHC) …
over area ratio for point multiplication (PM) computation in binary huff curves (BHC) …
Design and implementation of real-time image acquisition chip based on triple-hybrid encryption system
J Li, Y Luo, F Wang, W Gao - Electronics, 2022 - mdpi.com
With the improved hardware storage capabilities and the rapid development of artificial
intelligence image recognition technology, information is becoming image-oriented …
intelligence image recognition technology, information is becoming image-oriented …
An area-efficient ECC architecture over GF (2m) for resource-constrained applications
NP Kumar, C Shirisha - AEU-International Journal of Electronics and …, 2020 - Elsevier
Abstract Elliptic Curve Cryptography (ECC), an asymmetric-key cryptographic system,
received extensive research and industry recognition owing to its reliable security with …
received extensive research and industry recognition owing to its reliable security with …