2019
DOI: 10.1007/978-3-030-19813-8_20
|View full text |Cite
|
Sign up to set email alerts
|

LCBC-XTEA: High Throughput Lightweight Cryptographic Block Cipher Model for Low-Cost RFID Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 18 publications
0
8
0
Order By: Relevance
“…Anusha et al [32] drafted a pipelined architecture to implement an XTEA and TEA for the parallel computation while keeping the resources minimum to make them fit in the RFID authentication process. The developed architecture implemented in the artix-7 FPGA and computation performance is evaluated.…”
Section: Related Workmentioning
confidence: 99%
“…Anusha et al [32] drafted a pipelined architecture to implement an XTEA and TEA for the parallel computation while keeping the resources minimum to make them fit in the RFID authentication process. The developed architecture implemented in the artix-7 FPGA and computation performance is evaluated.…”
Section: Related Workmentioning
confidence: 99%
“…Its version are extended TEA and block TEA, which overcome the drawbacks of TEA cipher [46]. TEA hardware architecture provides simplicity, flexibility, less number of computations with the simple key scheduling [64]. XTEA is very fast algorithm as it does not use S-boxes and initialization time.…”
Section: G Noekeonmentioning
confidence: 99%
“…XTEA is very fast algorithm as it does not use S-boxes and initialization time. The structure of XTEA algorithm is Feistal and it is used for real time applications [64]. The complete detail of all light weight ciphers selected for security evaluation is given in Table 3.…”
Section: G Noekeonmentioning
confidence: 99%
“…The one drawback of this algorithmic approach is that both senders, as well as the receiver, needs to share the symmetric-key for data encryption before and then they can move for decryption. The symmetric key cryptographic algorithms [21][22] like AES, DES, LED, XTEA, and PRESENT are discussed in this section briefly.…”
Section: Security Algorithms For Physical Layermentioning
confidence: 99%