Artykuły w czasopismach na temat „Lightweight Encryption Cipher”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Lightweight Encryption Cipher”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Mishra, Girish, S. K. Pal, S. V. S. S. N. V. G. Krishna Murthy, Kanishk Vats i Rakshak Raina. "Distinguishing Lightweight Block Ciphers in Encrypted Images". Defence Science Journal 71, nr 5 (2.09.2021): 647–55. http://dx.doi.org/10.14429/dsj.71.16843.
Pełny tekst źródłaMatheis, Kenneth, Rainer Steinwandt i Adriana Suárez Suárez Corona. "Algebraic Properties of the Block Cipher DESL". Symmetry 11, nr 11 (15.11.2019): 1411. http://dx.doi.org/10.3390/sym11111411.
Pełny tekst źródłaKim, Hyunjun, Siwoo Eum, Wai-Kong Lee, Sokjoon Lee i Hwajeong Seo. "Secure and Robust Internet of Things with High-Speed Implementation of PRESENT and GIFT Block Ciphers on GPU". Applied Sciences 12, nr 20 (11.10.2022): 10192. http://dx.doi.org/10.3390/app122010192.
Pełny tekst źródłaSayyed, Karishma Shaukat, Prof S. R. Ganolkar i Prof S. O. Rajankar. "FPGA Implementation of Rectangle Lightweight Block Cipher". International Journal for Research in Applied Science and Engineering Technology 10, nr 5 (31.05.2022): 2426–33. http://dx.doi.org/10.22214/ijraset.2022.42143.
Pełny tekst źródłaZakaria, Abdul Alif, Azni Haslizan Ab Halim, Farida Ridzuan, Nur Hafiza Zakaria i Maslina Daud. "LAO-3D: A Symmetric Lightweight Block Cipher Based on 3D Permutation for Mobile Encryption Application". Symmetry 14, nr 10 (30.09.2022): 2042. http://dx.doi.org/10.3390/sym14102042.
Pełny tekst źródłaWang, Juan, i Qun Ding. "Dynamic Rounds Chaotic Block Cipher Based on Keyword Abstract Extraction". Entropy 20, nr 9 (11.09.2018): 693. http://dx.doi.org/10.3390/e20090693.
Pełny tekst źródłaAntal, Eugen, i Viliam Hromada. "A NEW STREAM CIPHER BASED ON FIALKA M-125". Tatra Mountains Mathematical Publications 57, nr 1 (1.11.2013): 101–18. http://dx.doi.org/10.2478/tmmp-2013-0038.
Pełny tekst źródłaZhang, Ping, i Qian Yuan. "Minimizing Key Materials: The Even–Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption". Security and Communication Networks 2020 (10.03.2020): 1–6. http://dx.doi.org/10.1155/2020/4180139.
Pełny tekst źródłaFan, Ting, Lingchen Li, Yongzhuang Wei i Enes Pasalic. "Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher". International Journal of Distributed Sensor Networks 18, nr 9 (wrzesień 2022): 155013292211193. http://dx.doi.org/10.1177/15501329221119398.
Pełny tekst źródłaAl-Omari, A. H. "Lightweight Dynamic Crypto Algorithm for Next Internet Generation". Engineering, Technology & Applied Science Research 9, nr 3 (8.06.2019): 4203–8. http://dx.doi.org/10.48084/etasr.2743.
Pełny tekst źródłaZhang, Xing, Jian Chen, Tianning Li, Gang Dai i Changda Wang. "LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages". Symmetry 15, nr 1 (7.01.2023): 177. http://dx.doi.org/10.3390/sym15010177.
Pełny tekst źródłaA. Baker, Shatha, i Ahmed S. Nori. "Comparison of the Randomness Analysis of the Modified Rectangle Block Cipher and Original algorithm". NTU Journal of Pure Sciences 1, nr 2 (31.05.2022): 10–21. http://dx.doi.org/10.56286/ntujps.v1i2.185.
Pełny tekst źródłaBansod, Gaurav, Narayan Pisharoty i Abhijit Patil. "PICO : An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing". Defence Science Journal 66, nr 3 (25.04.2016): 259. http://dx.doi.org/10.14429/dsj.66.9276.
Pełny tekst źródłaPrathiba, A., Suyash Vardhan Srivathshav, Ramkumar P. E., Rajkamal E. i Kanchana Bhaaskaran V. S. "Lightweight VLSI Architectures for Image Encryption Applications". International Journal of Information Security and Privacy 16, nr 1 (styczeń 2022): 1–23. http://dx.doi.org/10.4018/ijisp.291700.
Pełny tekst źródłaDamodharan, Jamunarani, Emalda Roslin Susai Michael i Nasir Shaikh-Husin. "High Throughput PRESENT Cipher Hardware Architecture for the Medical IoT Applications". Cryptography 7, nr 1 (6.02.2023): 6. http://dx.doi.org/10.3390/cryptography7010006.
Pełny tekst źródłaDing, Lina, Chunyuan Liu, Yanpeng Zhang i Qun Ding. "A New Lightweight Stream Cipher Based on Chaos". Symmetry 11, nr 7 (2.07.2019): 853. http://dx.doi.org/10.3390/sym11070853.
Pełny tekst źródłaMohammad Shah, Isma Norshahila, Eddie Shahril Ismail, Faieza Samat i Normahirah Nek Abd Rahman. "Modified Generalized Feistel Network Block Cipher for the Internet of Things". Symmetry 15, nr 4 (12.04.2023): 900. http://dx.doi.org/10.3390/sym15040900.
Pełny tekst źródłaGhorashi, Seyed, Tanveer Zia, Yinhao Jiang i Michael Bewong. "Software Optimisation of Lightweight Klein Encryption in the Internet of Things". Journal of Information Security and Cybercrimes Research 4, nr 2 (30.12.2021): 159–72. http://dx.doi.org/10.26735/pxae9280.
Pełny tekst źródłaMaolood, Abeer Tariq, Ekhlas Khalaf Gbashi i Eman Shakir Mahmood. "Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map". International Journal of Electrical and Computer Engineering (IJECE) 12, nr 5 (1.10.2022): 4988. http://dx.doi.org/10.11591/ijece.v12i5.pp4988-5000.
Pełny tekst źródłaGuang, Yerui, Longfei Yu, Wenjie Dong, Ya Wang, Jian Zeng, Jiayu Zhao i Qun Ding. "Chaos-Based Lightweight Cryptographic Algorithm Design and FPGA Implementation". Entropy 24, nr 11 (4.11.2022): 1610. http://dx.doi.org/10.3390/e24111610.
Pełny tekst źródłaFang, Xing, Hongxin Zhang, Xiaotong Cui, Yuanzhen Wang i Linxi Ding. "Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis". Entropy 25, nr 6 (7.06.2023): 908. http://dx.doi.org/10.3390/e25060908.
Pełny tekst źródłaZhong, Xiao Jun, i Lu Yao. "A Lightweight Message Encrypt Protocol for Electronic Commerce". Applied Mechanics and Materials 432 (wrzesień 2013): 545–48. http://dx.doi.org/10.4028/www.scientific.net/amm.432.545.
Pełny tekst źródłaFathy, Cherine, i Hassan M. Ali. "A Secure IoT-Based Irrigation System for Precision Agriculture Using the Expeditious Cipher". Sensors 23, nr 4 (13.02.2023): 2091. http://dx.doi.org/10.3390/s23042091.
Pełny tekst źródłaDunmore, Aeryn, Juliet Samandari i Julian Jang-Jaccard. "Matrix Encryption Walks for Lightweight Cryptography". Cryptography 7, nr 3 (16.08.2023): 41. http://dx.doi.org/10.3390/cryptography7030041.
Pełny tekst źródłaRuhil, Ankit, Dr Manjot Kaur Bhatia i Pooja kumari. "SLIM: A Lightweight Block Cipher for Internet of Health Things." International Journal for Research in Applied Science and Engineering Technology 10, nr 12 (31.12.2022): 370–81. http://dx.doi.org/10.22214/ijraset.2022.47879.
Pełny tekst źródłaFadhil, Heba Mohammed, Mohamed Elhoseny i Baydaa M. Mushgil. "Protecting Medical Data on the Internet of Things with an Integrated Chaotic-GIFT Lightweight Encryption Algorithm". Journal of Cybersecurity and Information Management 12, nr 1 (2023): 50–66. http://dx.doi.org/10.54216/jcim.120105.
Pełny tekst źródłaCherckesova, Larissa, Olga Safaryan, Pavel Razumov, Dmitry Medvedev, Veronica Kravchenko i Yuriy Ivanov. "Analysis of block encryption algorithms being used in devices with restricted amount of technological possibilities". E3S Web of Conferences 224 (2020): 01043. http://dx.doi.org/10.1051/e3sconf/202022401043.
Pełny tekst źródłaJin, Jungha, Yewon Oh i Keecheon Kim. "A Lightweight Block Cipher Algorithm for Secure SDN Environment". International Journal of Advanced Research in Engineering 4, nr 4 (30.12.2018): 1. http://dx.doi.org/10.24178/ijare.2018.4.4.01.
Pełny tekst źródłaAlharbi, Adel R., Hassan Tariq, Amer Aljaedi i Abdullah Aljuhni. "Latency-Aware Accelerator of SIMECK Lightweight Block Cipher". Applied Sciences 13, nr 1 (23.12.2022): 161. http://dx.doi.org/10.3390/app13010161.
Pełny tekst źródłaZhang, Ping. "Permutation-Based Lightweight Authenticated Cipher with Beyond Conventional Security". Security and Communication Networks 2021 (27.10.2021): 1–9. http://dx.doi.org/10.1155/2021/1468007.
Pełny tekst źródłaChakraborty, Bishwajit, i Mridul Nandi. "The mF mode of authenticated encryption with associated data". Journal of Mathematical Cryptology 16, nr 1 (1.01.2022): 73–97. http://dx.doi.org/10.1515/jmc-2020-0054.
Pełny tekst źródłaGhanim Sulaiman, Alyaa, i Sufyan Salim Mahmood AlDabbagh. "Modified 128-EEA2 Algorithm by Using HISEC Lightweight Block Cipher Algorithm with Improving the Security and Cost Factors". Indonesian Journal of Electrical Engineering and Computer Science 10, nr 1 (1.04.2018): 337. http://dx.doi.org/10.11591/ijeecs.v10.i1.pp337-342.
Pełny tekst źródłaKwon, Hyeokdong, SangWoo An, YoungBeom Kim, Hyunji Kim, Seung Ju Choi, Kyoungbae Jang, Jaehoon Park, Hyunjun Kim, Seog Chung Seo i Hwajeong Seo. "Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things". Electronics 9, nr 9 (22.09.2020): 1548. http://dx.doi.org/10.3390/electronics9091548.
Pełny tekst źródłaKanda, Guard, i Kwangki Ryoo. "Vedic Multiplier-based International Data Encryption Algorithm Crypto-Core for Efficient Hardware Multiphase Encryption Design". Webology 19, nr 1 (20.01.2022): 4581–96. http://dx.doi.org/10.14704/web/v19i1/web19304.
Pełny tekst źródłaHan, Guoyong, i Wenying Zhang. "Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo". Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7589306.
Pełny tekst źródłaWinarno, Agus, i Riri Fitri Sari. "A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher". Applied Sciences 12, nr 17 (1.09.2022): 8817. http://dx.doi.org/10.3390/app12178817.
Pełny tekst źródłaTripathy, Alakananda, Sateesh Kumar Pradhan, Ajit Kumar Nayak, Smita Rath i Alok Ranjan Tripathy. "Integration of PRESENT Cipher Model Using Bit Permutation in Wireless Sensor Network for Data Security". Journal of Computational and Theoretical Nanoscience 17, nr 11 (1.11.2020): 5037–45. http://dx.doi.org/10.1166/jctn.2020.9338.
Pełny tekst źródłaSawka, Maciej, i Marcin Niemiec. "A Sponge-Based Key Expansion Scheme for Modern Block Ciphers". Energies 15, nr 19 (20.09.2022): 6864. http://dx.doi.org/10.3390/en15196864.
Pełny tekst źródłaZhang, Xing, Shaoyu Tang, Tianning Li, Xiaowei Li i Changda Wang. "GFRX: A New Lightweight Block Cipher for Resource-Constrained IoT Nodes". Electronics 12, nr 2 (12.01.2023): 405. http://dx.doi.org/10.3390/electronics12020405.
Pełny tekst źródłaA. Dawood, Omar. "Fast lightweight block cipher design with involution substitution permutation network (SPN) structure". Indonesian Journal of Electrical Engineering and Computer Science 20, nr 1 (1.10.2020): 361. http://dx.doi.org/10.11591/ijeecs.v20.i1.pp361-369.
Pełny tekst źródłaPeng, Chunyan, Xiujuan Du, Keqin Li i Meiju Li. "An Ultra-Lightweight Encryption Scheme in Underwater Acoustic Networks". Journal of Sensors 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/8763528.
Pełny tekst źródłaAn, SangWoo, YoungBeom Kim, Hyeokdong Kwon, Hwajeong Seo i Seog Chung Seo. "Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units". Mathematics 8, nr 11 (31.10.2020): 1894. http://dx.doi.org/10.3390/math8111894.
Pełny tekst źródłaLiu, Ya, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li, Zhiqiang Liu i Yang Bao. "Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC". Computer Journal 62, nr 12 (3.07.2019): 1761–76. http://dx.doi.org/10.1093/comjnl/bxz059.
Pełny tekst źródłaShifa, Amna, Mamoona Asghar, Salma Noor, Neelam Gohar i Martin Fleury. "Lightweight Cipher for H.264 Videos in the Internet of Multimedia Things with Encryption Space Ratio Diagnostics". Sensors 19, nr 5 (11.03.2019): 1228. http://dx.doi.org/10.3390/s19051228.
Pełny tekst źródłaChatterjee, Runa, Rajdeep Chakraborty i Mondal J.K. "DESIGN OF LIGHTWEIGHT CRYPTOGRAPHIC MODEL FOR END-TO-END ENCRYPTION IN IOT DOMAIN". IRO Journal on Sustainable Wireless Systems 1, nr 04 (8.12.2019): 215–24. http://dx.doi.org/10.36548/jsws.2019.4.002.
Pełny tekst źródłaThorat, C. G., i V. S. Inamdar. "Implementation of new hybrid lightweight cryptosystem". Applied Computing and Informatics 16, nr 1/2 (4.05.2018): 195–206. http://dx.doi.org/10.1016/j.aci.2018.05.001.
Pełny tekst źródłaEl-hajj, Mohammed, Hussien Mousawi i Ahmad Fadlallah. "Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform". Future Internet 15, nr 2 (30.01.2023): 54. http://dx.doi.org/10.3390/fi15020054.
Pełny tekst źródłaSaraiva, Daniel A. F., Valderi Reis Quietinho Leithardt, Diandre de Paula, André Sales Mendes, Gabriel Villarrubia González i Paul Crocker. "PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices". Sensors 19, nr 19 (5.10.2019): 4312. http://dx.doi.org/10.3390/s19194312.
Pełny tekst źródłaChatamoni, Anil Kumar, i Rajendra Naik Bhukya. "Lightweight Compressive Sensing for Joint Compression and Encryption of Sensor Data". International Journal of Engineering and Technology Innovation 12, nr 2 (22.02.2022): 167–81. http://dx.doi.org/10.46604/ijeti.2022.8599.
Pełny tekst źródłaLiu, Hui, Bo Zhao, Jianwen Zou, Linquan Huang i Yifan Liu. "A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map". Security and Communication Networks 2020 (25.07.2020): 1–12. http://dx.doi.org/10.1155/2020/7151836.
Pełny tekst źródła