Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Field programmable gate array applications—A scientometric review

J Ruiz-Rosero, G Ramirez-Gonzalez, R Khanna - Computation, 2019 - mdpi.com
Field Programmable Gate Array (FPGA) is a general purpose programmable logic device
that can be configured by a customer after manufacturing to perform from a simple logic gate …

[HTML][HTML] A substitution box for lightweight ciphers to secure internet of things

V Panchami, MM Mathews - Journal of King Saud University-Computer and …, 2023 - Elsevier
Abstract The Internet of Things is a resource-constrained device that demands lightweight
cryptographic solutions to achieve high performance and optimal security. In lightweight …

[HTML][HTML] A novel 5-bit S-box design for lightweight cryptography algorithms

VA Thakor, MA Razzaque, AD Darji, AR Patel - Journal of Information …, 2023 - Elsevier
Cryptography is one of the techniques to secure communication and data transfer over the
network. It performs well on resource-rich devices (PC, servers, smartphones, etc.) …

[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites

FT Abdul Hussien, AMS Rahma… - Security and …, 2021 - Wiley Online Library
Providing security for transmitted data through the e‐commerce environment requires using
a fast and high secure encryption algorithm. Balancing between the speed and the security …

A novel systematic byte substitution method to design strong bijective substitution box (S-box) using piece-wise-linear chaotic map

A Ali, MA Khan, RK Ayyasamy, M Wasif - PeerJ Computer Science, 2022 - peerj.com
Cryptography deals with designing practical mathematical algorithms having the two
primitive elements of confusion and diffusion. The security of encrypted data is highly …

Design of compact s box for resource constrained applications

RS Jenny, R Sudhakar… - Journal of Physics …, 2021 - iopscience.iop.org
The era of IoT has brought huge impact in the lives of people. It changed the way the people
interact with the outside world and led to the development of many smart devices. The …

Variability analysis of SBOX with CMOS 45 nm technology

A Kumar, SL Tripathi, U Subramaniam - Wireless Personal …, 2022 - Springer
The consistent scaling of metal-oxide-semiconductor field-effect transistor devices lead to
parameter variations which become a significant design challenge for the researchers and …

S-box architecture

A Kumar, S Tejani - International Conference on Futuristic Trends in …, 2018 - Springer
Abstract Substitution-Box (S-BOX) is the most critical block in the Advanced Encryption
Standard (AES) algorithm, consumes 75% of total power during encryption. The primary …

Hardware footprints of S-box in lightweight symmetric block ciphers for IoT and CPS information security systems

A Prathiba, VSK Bhaaskaran - Integration, 2019 - Elsevier
The hardware footprint for S-box specification in lightweight block cipher as appropriate to
IoT and CPS information security systems is presented in this paper. The S-box Boolean …