43
Views
5
CrossRef citations to date
0
Altmetric
Articles

Light-weighted cryptographic algorithms for energy efficient applications

, &

References

  • Adesh Kumari, M. Yahya Abbasi, Vinod Kumar & Akber Ali Khan (2019) A secure user authentication protocol using elliptic curve cryptography, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 521-530, DOI: 10.1080/09720529.2019.1637155
  • Sharma A, Bhatt DP (2015), Emerging Application of Wireless Sensor Network (WSN) (Underwater Wireless Sensor Network). In: Advances in Computer Science and Information Technology (ACSIT) Print ISSN: 2393-9907; Online ISSN: 2393-9915; Volume 2, Number 1, Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit. html
  • Kaliski B. Moore’s Law. In: van Tilborg H.C.A., Jajodia S. (eds) Encyclopedia of Cryptography andSecurity. Springer, Boston, MA, 2011
  • William J. Buchanan, Shancang Li & Rameez Asif (2017) Lightweight cryptography methods, Journal of Cyber Security Technology, 1:3-4, 187-201, DOI: 10.1080/23742917.2017.1384917
  • Mourad Talbi, Med Salim Bouhlel, Application of a Lightweight Encryption Algorithm to a Quantized Speech Image for Secure IoT, (2018), Preprints (www.preprints.org)
  • Chaitra B, Kiran Kumar V.G, Shatharama Rai C, A Survey on Various lightweight Cryptographic Algorithms on FPGA, IOSR Journal of Electronics and Communication Engineering (IOSR -JECE) e-ISSN: 2278-2834,p-ISSN: 2278-8735.Volume 12, Issue 1
  • CRYPTREC, Cryptographic Technology Guideline, (Lightweight Cryptography) (2017), page 21, Evaluation of serial implementation
  • Kerry A. McKay, Larry Bassham, Meltem Sönmez Turan, Nicky Mouha (2016), Report on Lightweight Cryptography, NISTIR 8114
  • Bhatt DP, Pareek V (2015) Lifetime Enhancement of Wireless Sensor Networks Using Fermat Point and Data Aggregation Mechanism. In: Shetty N., Prasad N., Nalini N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi
  • Suman Bhakar & Devershi Pallavi Bhatt (2019) Optimizing latency time of the AR system through glyph detection, International Journal of Computers and Applications, 41:1, 14-30, DOI: 10.1080/1206212X.2018.1495863
  • William J. Buchanan, Shancang Li & Rameez Asif (2017) Lightweight cryptography methods, Journal of Cyber Security Technology, 1:3-4, 187-201, DOI: 10.1080/23742917.2017.1384917

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.