Flexible architectures for cryptographic algorithms—A systematic literature review

M Rashid, M Imran, AR Jafri… - Journal of Circuits …, 2019 - World Scientific
Symmetric and asymmetric cryptographic algorithms are used for a secure transmission of
data over an unsecured public channel. In order to use these algorithms in real-time …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

Hardware constructions for error detection in WG-29 stream cipher benchmarked on FPGA

J Kaur, AC Canto, MM Kermani… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
WG-29 is a Welch-Gong (WG) stream cipher, implemented in and an 11-stage LFSR, whose
polynomial-basis (PB)-based architecture is utilized in diverse applications. This work, for …

[PDF][PDF] Low Area PRESENT Cryptography in FPGA Using TRNGPRNG Key Generation

T Kowsalya, RG Babu… - … Materials & Continua, 2021 - researchgate.net
Lightweight Cryptography (LWC) is widely used to provide integrity, secrecy and
authentication for the sensitive applications. However, the LWC is vulnerable to various …

Comparative analysis of flexible cryptographic implementations

M Rashid, M Imran, AR Jafri - 2016 11th International …, 2016 - ieeexplore.ieee.org
Flexible hardware implementations of cryptographic algorithms in the real time applications
have been frequently proposed. This paper classifies the state-of-the-art research practices …

Lightweight encryption for short-range wireless biometric authentication systems in Industry 4.0

B Bordel, R Alcarria, T Robles - Integrated Computer-Aided …, 2022 - content.iospress.com
Most recent solutions for users' authentication in Industry 4.0 scenarios are based on unique
biological characteristics that are captured from users and recognized using artificial …

Fpga implementations of grain v1, mickey 2.0, trivium, lizard and plantlet

B Li, M Liu, D Lin - Microprocessors and Microsystems, 2020 - Elsevier
In this paper, three eSTREAM Portfolio 2 ciphers: Grain v1, Mickey 2.0 and Trivium, and two
Grain-like stream ciphers: Lizard and Plantlet are implemented in three versions aimed at …

Hardware optimizations of fruit-80 stream cipher: smaller than grain

G Yang, Z Shi, C Chen, H Xiong, F Li, H Hu… - ACM Transactions on …, 2023 - dl.acm.org
Fruit-80, which emerged as an ultra-lightweight stream cipher with 80-bit secret key, is
oriented toward resource-constrained devices in the Internet of Things. In this article, we …

Secure embedded system hardware design–A flexible security and trust enhanced approach

AP Fournaris, N Sklavos - Computers & Electrical Engineering, 2014 - Elsevier
Embedded systems have found a very strong foothold in global Information Technology (IT)
market since they can provide very specialized and intricate functionality to a wide range of …

Architecture design of an area efficient high speed crypto processor for 4G LTE

AN Bikos, N Sklavos - IEEE Transactions on Dependable and …, 2016 - ieeexplore.ieee.org
The whole security architecture of LTE/SAE (Long Term Evolution/System Architecture
Evolution) is being consisted of four main hardware-oriented cryptographic algorithms …