Journal articles on the topic 'Cryptographic devices'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptographic devices.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
John, Anita, and Jimmy Jose. "Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions." Complex Systems 32, no. 2 (2023): 171–88. http://dx.doi.org/10.25088/complexsystems.32.2.171.
Full textWai Kaey, Tan. "Navigating the Quantum Era: Exploring Lightweight Quantum-Resistant Cryptography." IC-ITECHS 5, no. 1 (2024): 586–96. https://doi.org/10.32664/ic-itechs.v5i1.1489.
Full textPyrkova, A. YU, and ZH E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 894. http://dx.doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Full textPyrkova, A. YU., and ZH.E. Temirbekova. "Compare encryption performance across devices to ensure the security of the IOT." Indonesian Journal of Electrical Engineering and Computer Science 20, no. 2 (2020): 894–902. https://doi.org/10.11591/ijeecs.v20.i2.pp894-902.
Full textBhawna Garg. "Investigations on Application of Probabilistic and Mathematical Computing in Design and Statistical Analysis of Lightweight Cryptography." Communications on Applied Nonlinear Analysis 31, no. 2 (2024): 311–30. http://dx.doi.org/10.52783/cana.v31.571.
Full textSeptafiansyah, Dwi Putra, Yudhiprawira Mario, Sutikno Sarwono, Kurniawan Yusuf, and Suwandi Ahmad Adang. "Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 3 (2019): 1282–89. https://doi.org/10.12928/TELKOMNIKA.v17i3.9384.
Full textDe Moura, Pablo Rubens, Elmer Rolando Llanos Villarreal, Diego Antonio de Moura Fonsêca, and Andrés Ortiz Salazar. "Post-Quantum Cryptography for the Internet of Things: new approach." Journal of Engineering and Exact Sciences 11, no. 1 (2025): 21741. https://doi.org/10.18540/jcecvl11iss1pp21741.
Full textSundararajan, Ananiah Durai Durai, and Rajashree R. "A Comprehensive Survey on Lightweight Asymmetric Key Cryptographic Algorithm for Resource Constrained Devices." ECS Transactions 107, no. 1 (2022): 7457–68. http://dx.doi.org/10.1149/10701.7457ecst.
Full textChochtoula, Despoina, Aristidis Ilias, Yannis C. Stamatiou, and Christos Makris. "Integrating Elliptic Curve Cryptography with the Modbus TCP SCADA Communication Protocol." Future Internet 14, no. 8 (2022): 232. http://dx.doi.org/10.3390/fi14080232.
Full textJois, Tushar M., Gabrielle Beck, Sofia Belikovetsky, et al. "SocIoTy: Practical Cryptography in Smart Home Contexts." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 447–64. http://dx.doi.org/10.56553/popets-2024-0026.
Full textMarin, Leandro, Antonio Jara, and Antonio Skarmeta. "Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2368–84. https://doi.org/10.3217/jucs-019-16-2368.
Full textKumar, Dilip, and Manoj Kumar. "Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT." International Journal of Computer Network and Information Security 16, no. 2 (2024): 42–54. http://dx.doi.org/10.5815/ijcnis.2024.02.04.
Full textDewamuni, Zenith, Bharanidharan Shanmugam, Sami Azam, and Suresh Thennadil. "Bibliometric Analysis of IoT Lightweight Cryptography." Information 14, no. 12 (2023): 635. http://dx.doi.org/10.3390/info14120635.
Full textSuryateja, P. S., and K. Venkata Rao. "A Survey on Lightweight Cryptographic Algorithms in IoT." Cybernetics and Information Technologies 24, no. 1 (2024): 21–34. http://dx.doi.org/10.2478/cait-2024-0002.
Full textAjani, Samir N., Sukhvinder Singh Dari, Dharmesh Dhabliya, Anishkumar Dhablia, Shreyas Dingankar, and M. Jahir Pasha. "Securing micro transactions in the Internet of Things with cryptography primitives." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 753–62. http://dx.doi.org/10.47974/jdmsc-1925.
Full textAsrin Banu, P., and K. Sathish Kumar. "An Experimental Study on Energy Consumption of Cryptographic Algorithms for Mobile Hand-Held Devices." Asian Journal of Computer Science and Technology 1, no. 1 (2012): 91–97. http://dx.doi.org/10.51983/ajcst-2012.1.1.1665.
Full textMary Shamala L., Zayaraz G., Vivekanandan K., and Vijayalakshmi V. "A Tweakable Key Alternating Lightweight Cipher for Internet of Things." International Journal of Information Security and Privacy 14, no. 4 (2020): 113–33. http://dx.doi.org/10.4018/ijisp.2020100107.
Full textJerbi, Wassim, Abderrahmen Guermazi, Omar Cheikhrouhou, and Hafedh Trabelsi. "CoopECC: A Collaborative Cryptographic Mechanism for the Internet of Things." Journal of Sensors 2021 (March 11, 2021): 1–8. http://dx.doi.org/10.1155/2021/8878513.
Full textGarrard, Jack, Manuel Aguilar Rios, and Bertrand Cambou. "Enhancing the SRAM PUF with an XOR Gate." Applied Sciences 14, no. 21 (2024): 10026. http://dx.doi.org/10.3390/app142110026.
Full textAL-WATTAR, Auday H. "A NEW PROPOSED LIGHTWEIGHT CIPHER." MINAR International Journal of Applied Sciences and Technology 05, no. 04 (2023): 192–205. http://dx.doi.org/10.47832/2717-8234.17.14.
Full textMohapatra, A. K., Pankaj Lathar, and Shailendra Singh Gaur. "A novel security algorithm for text and image data using multi node cryptographic algorithm." Journal of Discrete Mathematical Sciences and Cryptography 28, no. 3 (2025): 753–64. https://doi.org/10.47974/jdmsc-1946.
Full textAdeoye, Seun. "Securing IoT Devices: A Novel Approach Using Blockchain and Quantum Cryptography." Cognizance Journal of Multidisciplinary Studies 5, no. 2 (2025): 302–26. https://doi.org/10.47760/cognizance.2025.v05i02.022.
Full textSeun, Adeoye. "Securing IoT Devices: A Novel Approach Using Blockchain and Quantum Cryptography." Cognizance Journal of Multidisciplinary Studies (CJMS) 5, no. 2 (2025): 302–26. https://doi.org/10.47760/cognizance.2025.v05i02.022.
Full textVULPE, Alexandru, Raluca ANDREI, Alexandru BRUMARU, and Octavian FRATU. "LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHM IMPLEMENTATION IN A MICROCONTROLLER SYSTEM." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 260–64. http://dx.doi.org/10.53477/2668-2028-21-33.
Full textLatika Rahul Desai. "Enhancing Security in IoT Devices with a Comprehensive Analysis of Lightweight Cryptographic Algorithms." Advances in Nonlinear Variational Inequalities 27, no. 4 (2024): 325–40. http://dx.doi.org/10.52783/anvi.v27.1555.
Full textYan, Tian Yun, Kai Kuo Xu, Min Wei, and Jia He. "Studies on Security Communications of Embedded Devices." Advanced Materials Research 216 (March 2011): 609–12. http://dx.doi.org/10.4028/www.scientific.net/amr.216.609.
Full textHernández-Álvarez, Luis, Juan José Bullón Pérez, Farrah Kristel Batista, and Araceli Queiruga-Dios. "Security Threats and Cryptographic Protocols for Medical Wearables." Mathematics 10, no. 6 (2022): 886. http://dx.doi.org/10.3390/math10060886.
Full textBerger, Denis, Mouad Lemoudden, and William J. Buchanan. "Post-Quantum Migration of the Tor Application." Journal of Cybersecurity and Privacy 5, no. 2 (2025): 13. https://doi.org/10.3390/jcp5020013.
Full textIftikhar, U., K. Asrar, M. Waqas, and S. A. Ali. "Evaluating the Performance Parameters of Cryptographic Algorithms for IOT-based Devices." Engineering, Technology & Applied Science Research 11, no. 6 (2021): 7867–74. http://dx.doi.org/10.48084/etasr.4263.
Full textXiao, Dianyan, and Yang Yu. "Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4957045.
Full textVyshali Rao K P. "Analytical Study of Authentication and Lightweight Security Techniques in 5G-Enabled IoT Networks." Journal of Information Systems Engineering and Management 10, no. 15s (2025): 215–27. https://doi.org/10.52783/jisem.v10i15s.2445.
Full textRaut, Krutia. "Secure Message Hashing with SHA-256: Cryptographic Implementation." International Journal for Research in Applied Science and Engineering Technology 12, no. 11 (2024): 1288–94. http://dx.doi.org/10.22214/ijraset.2024.65078.
Full textDumitru, Ionuț Cătălin, and Mihai Togan. "Client Module with Multifactor Authentication for Remote Electronic Signature Generation Using Cryptography API: Next Generation." Journal of Military Technology 3, no. 1 (2020): 5–10. http://dx.doi.org/10.32754/jmt.2020.1.01.
Full textSaleh, Shaimaa S., Amr A. Al-Awamry, and Ahmed Taha. "Tailoring AES for resource-constrained IoT devices." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 1 (2024): 290. http://dx.doi.org/10.11591/ijeecs.v36.i1.pp290-301.
Full textZinkus, Maximilian, Tushar M. Jois, and Matthew Green. "SoK: Cryptographic Confidentiality of Data on Mobile Devices." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 586–607. http://dx.doi.org/10.2478/popets-2022-0029.
Full textPasunuru, Sreekanth, and Anil Kumar Malipeddi. "Cryptography in IoT: Securing the Next Generation of Connected Devices." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–6. https://doi.org/10.55041/ijsrem6584.
Full textEhsan, M. Awais, Walaa Alayed, Amad Ur Rehman, Waqar ul Hassan, and Ahmed Zeeshan. "Post-Quantum KEMs for IoT: A Study of Kyber and NTRU." Symmetry 17, no. 6 (2025): 881. https://doi.org/10.3390/sym17060881.
Full textFeilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Full textBrahmeshwar, Singh Umang, Narendra Kumar Upadhyay, Nagesh Sharma, and Kalpana Jaswal. "Lightweight Cryptography for Securing IoT Networks: Balancing Performance, Scalability, and Security in Resource-Constrained Environments." International Journal for Research in Applied Science and Engineering Technology 12, no. 12 (2024): 2154–60. https://doi.org/10.22214/ijraset.2024.66155.
Full textBenhadjyoussef, Noura, Wajih Elhadjyoussef, Mohsen Machhout, Rached Tourki, and Kholdoun Torki. "Enhancing a 32-Bit Processor Core with Efficient Cryptographic Instructions." Journal of Circuits, Systems and Computers 24, no. 10 (2015): 1550158. http://dx.doi.org/10.1142/s0218126615501583.
Full textDhingra, Akshaya, Vikas Sindhu, and Anil Sangwan. "Symmetrical cryptographic algorithms in the lightweight internet of things." International Journal of Informatics and Communication Technology (IJ-ICT) 14, no. 1 (2025): 307. https://doi.org/10.11591/ijict.v14i1.pp307-314.
Full textAkshaya, Dhingra, Sindhu Vikas, and Sangwan Anil. "Symmetrical cryptographic algorithms in the lightweight internet of things." International Journal of Informatics and Communication Technology 14, no. 1 (2025): 307–14. https://doi.org/10.11591/ijict.v14i1.pp307-314.
Full textShaimaa, S. Saleh Amr A. Al-Awamry Ahmed Taha. "Tailoring AES for resource-constrained IoT devices." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 1 (2024): 290–301. https://doi.org/10.11591/ijeecs.v36.i1.pp290-301.
Full textRobert, Wamusi, Asiku Denis, Adebo Thomas, et al. "A Comprehensive Review on Cryptographic Techniques for Securing Internet of Medical Things: A State-of-the-Art, Applications, Security Attacks, Mitigation Measures, and Future Research Direction." Mesopotamian Journal of Artificial Intelligence in Healthcare 2024 (November 3, 2024): 135–69. https://doi.org/10.58496/mjaih/2024/016.
Full textMathew Sebastian. "Cryptographic milestones: Origins, modern algorithms, and the quantum era." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 387–93. https://doi.org/10.30574/wjaets.2025.15.2.0561.
Full textDhansukhbhai Patel, Dr Dipakkumar, and Dr Subhashchandra Desai. "Securing textual information with an image in the image using a visual cryptography AES algorithm." International Journal of Enhanced Research in Management & Computer Applications 12, no. 06 (2023): 75–90. http://dx.doi.org/10.55948/ijermca.2023.0611.
Full textMacKenzie, Philip, and Michael K. Reiter. "Networked cryptographic devices resilient to capture." International Journal of Information Security 2, no. 1 (2003): 1–20. http://dx.doi.org/10.1007/s10207-003-0022-8.
Full textHayashi, Yu-ichi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone. "Transient IEMI Threats for Cryptographic Devices." IEEE Transactions on Electromagnetic Compatibility 55, no. 1 (2013): 140–48. http://dx.doi.org/10.1109/temc.2012.2206393.
Full textSeyi, Olanrewaju Babatunde, Oghene Freddinnand Best, and Akilo Babalola Eyitemi. "Implementation of Caesar Cipher Encryption Using Python Programming Language." International Journal of Multidisciplinary Research and Growth Evaluation 5, no. 5 (2024): 533–39. http://dx.doi.org/10.54660/.ijmrge.2024.5.5.533-539.
Full textRahul, P. Neve, and Bansode Rajesh. "Attack Analysis on Hybrid-SIMON-SPECKey Lightweight Cryptographic Algorithm for IoT Applications." Indian Journal of Science and Technology 17, no. 10 (2024): 932–40. https://doi.org/10.17485/IJST/v17i10.2811.
Full text