2016
DOI: 10.1016/j.protcy.2016.08.148
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of Modified Lightweight Advanced Encryption Standard in FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…Identity-based cryptography (IBC) and elliptic curve cryptography (ECC) [5] are the two security solutions for this problem. Other cryptographic algorithms used in the control layer are Hash algorithms [6], AES [7], PRESENT [8], DES [9], etc.…”
Section: Control Layer/infrastructure Layermentioning
confidence: 99%
“…Identity-based cryptography (IBC) and elliptic curve cryptography (ECC) [5] are the two security solutions for this problem. Other cryptographic algorithms used in the control layer are Hash algorithms [6], AES [7], PRESENT [8], DES [9], etc.…”
Section: Control Layer/infrastructure Layermentioning
confidence: 99%
“…is is because most IoT devices have AES-specific cryptographic acceleration hardware. It also offers robust encryption with a reduced key size [35,36] compared to an asymmetric encryption algorithm with the same robustness level. In addition, these encryption operations require fewer resources than asymmetric encryption.…”
Section: Implementation Of Secure Exchange Of Contextmentioning
confidence: 99%
“…To prevent an unauthorized entity accessing the content of the data, Advanced Encryption Standard should be implemented in the system with the symmetric key system that helps to reduce operation time during encrypting and decrypting processes with the fast-paced system [21]. To prevent data alteration from an unauthorized entity, the system should be built with blockchain technology, because the data is saved within a block, that has a timestamp, and the integrity is stated as a hash in a form of hexadecimal string from the previous block, and so on [22].…”
Section: Literature Reviewmentioning
confidence: 99%