References
- Adesh Kumari, M. Yahya Abbasi, Vinod Kumar & Akber Ali Khan (2019) A secure user authentication protocol using elliptic curve cryptography, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 521-530, DOI: 10.1080/09720529.2019.1637155
- Sharma A, Bhatt DP (2015), Emerging Application of Wireless Sensor Network (WSN) (Underwater Wireless Sensor Network). In: Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 1, Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit. html
- Kaliski B. Moore’s Law. In: van Tilborg H.C.A., Jajodia S. (eds) Encyclopedia of Cryptography andSecurity. Springer, Boston, MA, 2011
- William J. Buchanan, Shancang Li & Rameez Asif (2017) Lightweight cryptography methods, Journal of Cyber Security Technology, 1:3-4, 187-201, DOI: 10.1080/23742917.2017.1384917
- Mourad Talbi, Med Salim Bouhlel, Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT, (2018), Preprints (www.preprints.org)
- Chaitra B, Kiran Kumar V.G, Shatharama Rai C, A Survey on Various lightweight Cryptographic Algorithms on FPGA, IOSR Journal of Electronics and Communication Engineering (IOSR -JECE) e-ISSN: 2278-2834,p-ISSN: 2278-8735.Volume 12, Issue 1
- CRYPTREC, Cryptographic Technology Guideline, (Lightweight Cryptography) (2017), page 21, Evaluation of serial implementation
- Kerry A. McKay, Larry Bassham, Meltem Sönmez Turan, Nicky Mouha (2016), Report on Lightweight Cryptography, NISTIR 8114
- Bhatt DP, Pareek V (2015) Lifetime Enhancement of Wireless Sensor Networks Using Fermat Point and Data Aggregation Mechanism. In: Shetty N., Prasad N., Nalini N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi
- Suman Bhakar & Devershi Pallavi Bhatt (2019) Optimizing latency time of the AR system through glyph detection, International Journal of Computers and Applications, 41:1, 14-30, DOI: 10.1080/1206212X.2018.1495863
- William J. Buchanan, Shancang Li & Rameez Asif (2017) Lightweight cryptography methods, Journal of Cyber Security Technology, 1:3-4, 187-201, DOI: 10.1080/23742917.2017.1384917