A novel simplified aes algorithm for lightweight real-time applications: Testing and discussion

M Qasaimeh, RS Al-Qassas… - Recent Advances in …, 2020 - ingentaconnect.com
Background: Lightweight cryptographic algorithms have been the focus of many researchers
in the past few years. This has been inspired by the potential developments of lightweight …

Modified generalized Feistel network block cipher for the Internet of Things

IN Mohammad Shah, ES Ismail, F Samat… - Symmetry, 2023 - mdpi.com
With the advent of the Internet-of-Things (IoT) technologies, millions of low-resource devices
are constantly used at the network's edge. As a result, the large amount of private and …

Software design and experimental evaluation of a reduced aes for iot applications

M Qasaimeh, RS Al-Qassas, M Ababneh - Future Internet, 2021 - mdpi.com
IoT devices include RFID tags, microprocessors, sensors, readers, and actuators. Their main
characteristics are their limited resources and computing capabilities, which pose critical …

Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT

AA Zakaria, AH Azni, F Ridzuan, NH Zakaria… - IEEE …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a broad range of applications enabled by the connection of
devices such as sensors, actuators, and monitors accessible through the Internet. Massive …

Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security

M Qasaimeh, RS Al-Qassas, S Tedmori - Multimedia Tools and …, 2018 - Springer
In the past few years, various lightweight cryptographic algorithms have been proposed to
balance the trade-offs between the requirements of resource constrained IoT devices and …

Performance analysis of enhanced SPECK algorithm

RAF Lustro, AM Sison, RP Medina - Proceedings of the 4th International …, 2018 - dl.acm.org
A secure lightweight block cipher is an effective security solution for applications running on
resource-constrained devices. The SPECK family of lightweight block ciphers is designed for …

Modifications of key schedule algorithm on RECTANGLE block cipher

AA Zakaria, AH Azni, F Ridzuan, NH Zakaria… - Advances in Cyber …, 2021 - Springer
Key schedule algorithm is one of the core elements that significantly affect the security of an
encryption algorithm. While its importance is undeniable, the key schedule algorithm has not …

An Upgraded Data Security Based on Homomorphic Encryption and Aggregate Signature Method in Wireless Sensor Network.

R Ranjan, VK Ahlawat - Journal of Cybersecurity & …, 2023 - search.ebscohost.com
Wireless sensor networks (WSN) have been implemented in nearly every field of use
because they offer a solution to practical problems that can also be affordably implemented …

A novel stream cipher based on quasigroups and QG-PRNG

U Kumar, VC Venkaiah - International Journal of Information …, 2023 - inderscienceonline.com
Stream ciphers that use the XOR-function are vulnerable to known-plaintext and reused-key
attacks. To overcome such shortcomings of the existing ciphers, we hereby propose a novel …

Implementasi Algoritme Speck Untuk Enkripsi One-Time Password Pada Two-Factor Authentication

MA Taqwim, A Kusyanti, RA Siregar - … Teknologi Informasi Dan Ilmu …, 2021 - j-ptiik.ub.ac.id
Static authentication sangat rentan terkena serangan, maka dilakukan two-factor
authentication dengan menambahkan OTP sebagai salah satu faktor dalam autentikasinya …