A multithreaded programming approach for multimedia big data: encryption system

S Aljawarneh, MB Yassein, WA Talafha - Multimedia Tools and …, 2018 - Springer
Multimedia is currently seen to dominate the internet network and the mobile network traffic;
hence, it is seen as the largest Big data. Generally, the symmetric encryption algorithms are …

Light weight cryptographic algorithms for medical internet of things (IoT)-a review

DJ Rani, SE Roslin - 2016 Online international conference on …, 2016 - ieeexplore.ieee.org
Internet of things (IoT) is communication between smart objects and human. It finds
enormous applications in the field of healthcare monitoring, information management …

A complexity-reduced block encryption algorithm suitable for internet of things

X Guo, J Hua, Y Zhang, D Wang - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) poses stringent requirements on service quality and security
strength. A highly reliable encryption algorithm with low complexity is required to ensure …

High-level implementation of a chaotic and AES based crypto-system

F Sbiaa, S Kotel, M Zeghid, R Tourki… - Journal of Circuits …, 2017 - World Scientific
Given the increasing complexity of cryptographic devices, testing their security level against
existing attacks requires a fast simulation environment. SystemC is a standard language that …

Towards genetic cryptography for biomedical wireless sensor networks gateways

Z Hamici - IEEE Journal of Biomedical and Health Informatics, 2018 - ieeexplore.ieee.org
The integration of wireless sensor networks into Internet of things, led to a new generation of
sensor nodes, directly connected to remote servers, for signal processing and decision …

Security enhancement of blowfish block cipher

R Patel, P Kamboj - International conference on smart trends for …, 2016 - Springer
Cryptography is the first line of defense to protect the data from intruder. Symmetric
cryptography and asymmetric cryptography are two cryptographic based algorithms that …

Performance Comparison of Software-Efficient Implementations of the PRESENT Block Cypher

S Banday, M Nazish, I Sultan… - … and Robotics (STCR), 2022 - ieeexplore.ieee.org
PRESENT is one of the first standard hardware efficient, ultra-lightweight block cyphers
designed to secure highly resource-constrained devices. The 4x4 s-boxes and 64-bit …

A Study of AES Software Implementation for IoT Systems

A Tripathy, B Singh - … Conference on Issues and Challenges in …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of physical objects. This concept enables data
exchange between connected things without human intervention. However, the devices …

Secrecy performance analysis of hybrid AF-DF relaying under multi hop environment

S Pal, P **dal - Wireless Personal Communications, 2020 - Springer
In this work, a three-hop wireless relaying model comprising of a single source and
destination node, along with two relay nodes and an eavesdropper is considered. We made …

[PDF][PDF] Block symmetric cipher with random s-boxes

K Lisickiy, V Dolgov, I Lisickaya… - International Journal …, 2019 - pdfs.semanticscholar.org
This paper describes a new 256-bit block symmetric substitutionpermutation cipher, called
managed substitution cipher. This is a cipher with single-layer permutated transformations in …