High performance FPGA based secured hardware model for IoT devices

A Shrivastava, D Haripriya, YD Borole, A Nanoty… - International Journal of …, 2022 - Springer
Data transmission is always vulnerable to assault on the digital side. Cipher strength
analysis is a crucial component of a business or academic safety evaluation. For data …

Comparative Analysis of Power, Temperature and Hardware Utilization on Implementation of Half Adder

S Shrivastava, A Kaur - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Several developing countries have been faced with serious energy deficits. Environmentally
conscious communication has been advanced by the creation of an economical half adder …

Hardware Implementation of Address Register Circuit on VLSI Based FPGA Device

K Kumar, A Shrivastava, A Rana, B Pant… - 2022 2nd …, 2022 - ieeexplore.ieee.org
In this study, we construct an (AR) address register that is responsive to voltage increases.
We investigated the power dissipation of an address register using the Xilinx 14.1 ISE tool …

SSTL IO Standard Based Low Power Design of DES Encryption Algorithm on 28 nm FPGA

K Kumar, NP Stenin, P Pandey… - 2024 IEEE 13th …, 2024 - ieeexplore.ieee.org
The principal objective of the Input Output (IO) standard is to match the impedance of the info
and result port alongside FPGA gadget. During our exploration, we saw that different IO …

Comparative Energy & Hardware Analysis on Implementation of Full Subtractor Using Different FPGAs Families

S Shrivastava, A Kaur - 2023 6th International Conference on …, 2023 - ieeexplore.ieee.org
There are major energy challenges in several developing countries. The development of an
effective Full subtractor using the Vivado software platform and multiple generations of …

[PDF][PDF] DESIGN AND IMPLEMENTATION OF LOW POWER THERMAL AWARE ATM

K Dwivedi - academia.edu
In this Paper, we have designed a Automated Teller Machine (ATM) which is
electromechanical machine works in different temperature. We analysed the Static Power at …

[PDF][PDF] HARDWARE SECURITY MODEL WITH VEDIC MULTIPLIER BASED ECC ALGORITHM ON HIGH-PERFORMANCE FPGA DEVICE

S Singh, S Soni - ictactjournals.in
The key problem that the world is most concerned about is security. Data security is the
process of preventing unauthorized access to sensitive data. It includes all of the …