2016 11th International Conference on Knowledge, Information and Creativity Support Systems (KICSS) 2016
DOI: 10.1109/kicss.2016.7951435
|View full text |Cite
|
Sign up to set email alerts
|

Power consumption for security on mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Several key sizes and different cipher block modes and their effects on energy consumption have been investigated. In [47], the authors study the power consumption of deploying several cipher algorithms on Android smartphones where several les with different sizes have been examined. Particularly, the AES nalist algorithm RC6, Two sh, Serpent, and Mars algorithms.…”
Section: Cryptographic Algorithms In Wsnsmentioning
confidence: 99%
“…Several key sizes and different cipher block modes and their effects on energy consumption have been investigated. In [47], the authors study the power consumption of deploying several cipher algorithms on Android smartphones where several les with different sizes have been examined. Particularly, the AES nalist algorithm RC6, Two sh, Serpent, and Mars algorithms.…”
Section: Cryptographic Algorithms In Wsnsmentioning
confidence: 99%
“…The power consumption of the AES finalists RC6, Twofish, Serpent, and Mars was measured on an Android smartphone device in [39]. File sizes of 1, 2, 3, 4, and 5 megabytes were used for encryption and decryption of data.…”
Section: Related Workmentioning
confidence: 99%