ASIC-oriented comparative review of hardware security algorithms for internet of things applications

MA Bahnasawi, K Ibrahim, A Mohamed… - 2016 28th …, 2016 - ieeexplore.ieee.org
Research into the security of the Internet of Things (IoT) needs to utilize particular algorithms
that offer ultra-low power consumption and a long lifespan, along with other parameters …

PQ-HPKE: post-quantum hybrid public key encryption

M Anastasova, P Kampanakis, J Massimo - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Public key cryptography is used to asymmetrically establish keys, authenticate or encrypt
data between communicating parties at a relatively high performance cost. To reduce …

Lattice based access control for protecting user data in cloud environments with hybrid security

N Saravanan, A Umamakeswari - Computers & Security, 2021 - Elsevier
Cloud computing is an aspired reverie of computing that provides a huge capacity of
storage. The users of the cloud, store large volumes of their private data, where sometimes …

Residue number system asymmetric cryptoalgorithms

YM Nykolaychuk, IZ Yakymenko, NY Vozna… - … and Systems Analysis, 2022 - Springer
Theoretical foundations of asymmetric encryption based on the residue number system and
its modified perfect form are developed. The moduli of the residue number system are …

Comparative study of cryptography for cloud computing for data security

P Mathur, AK Gupta… - Recent Advances in …, 2021 - ingentaconnect.com
Background: Cloud computing is an emerging technique by which anyone can access the
applications as utilities over the internet. Cloud computing is the technology which …

[PDF][PDF] Study & analysis of cryptography algorithms: RSA, AES, DES, T-DES, blowfish

P Singh, S Kumar - Int. J. Eng. Technol, 2017 - researchgate.net
Cryptography is about protecting the data from third parties or from public to read
confidential data. Cryptography mainly focuses on encrypting the data or we can say …

Cellular automata based cryptography model for reliable encryption using state transition in wireless network optimizing data security

A Banerjee, A Kundu - Wireless Personal Communications, 2021 - Springer
Authors propose a hardware based approach for reliable encryption in wireless network
using Cellular Automata (CA). Distinct layers of encryption have been utilized in proposed …

Efficient energy saving cryptographic techniques with software solution in wireless network

AP Sawlikar, ZJ Khan, SG Akojwar - Cryptography: Breakthroughs in …, 2020 - igi-global.com
To reduce communication costs, to protect our data from eavesdropping and from
unauthorized users, cryptographic algorithms are used. Cryptographic module has to be …

[PDF][PDF] Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithm

R Mahaveerakannan, CSG Dhas - International Journal of …, 2016 - researchgate.net
The cryptography network security means to protect data transmission during their
interconnected networks in all over the world. Cryptography network security is the important …

Digital signature authentication using Rivest-Shamir-Adleman cryptographic algorithm

M Melina, AI Hadiana, EK Putra, S Sukono… - AIP Conference …, 2024 - pubs.aip.org
Currently, every electronic transaction involving important information requires a digital
signature (DS). The procedure used to prove the authenticity of the DS, the authenticity of …