2022
DOI: 10.1504/ijesdf.2022.122578
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Formal security verification of BAN logic was presented to exhibit that LS-BSA provides appropriate secret secure-session key agreement and cooperative user authentication. Rajashree et al [16] presented an architecture dependent upon the secure hash algorithm (SHA) algorithms and advanced encryption standard (AES) algorithmic protocol. SHA must be concurrently implemented as the AES method.…”
Section: Literature Workmentioning
confidence: 99%
“…Formal security verification of BAN logic was presented to exhibit that LS-BSA provides appropriate secret secure-session key agreement and cooperative user authentication. Rajashree et al [16] presented an architecture dependent upon the secure hash algorithm (SHA) algorithms and advanced encryption standard (AES) algorithmic protocol. SHA must be concurrently implemented as the AES method.…”
Section: Literature Workmentioning
confidence: 99%