Journal articles on the topic 'Light weight cryptography'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Light weight cryptography.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.
Full textAbd Zaid, Mustafa, and Soukaena Hassan. "Proposal Framework to Light Weight Cryptography Primitives." Engineering and Technology Journal 40, no. 4 (2022): 516–26. http://dx.doi.org/10.30684/etj.v40i4.1679.
Full textAhmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.
Full textAlkhudaydi, Malak G., and Adnan A. Gutub. "Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications." Journal of Information Security and Cybercrimes Research 3, no. 1 (2020): 13–30. http://dx.doi.org/10.26735/fmit1649.
Full textRaja, M., Dr S. Dhanasekaran, and Dr V. Vasudevan. "Light Weight Cryptography based Medical Data and Image Encryption Scheme." Webology 18, no. 2 (2021): 88–104. http://dx.doi.org/10.14704/web/v18i2/web18309.
Full textSangari, S., and Martin Leo Manickam. "A LIGHT-WEIGHT CRYPTOGRAPHY ANALYSIS FOR WIRELESS BASED HEALTHCARE APPLICATIONS." Journal of Computer Science 10, no. 10 (2014): 2088–94. http://dx.doi.org/10.3844/jcssp.2014.2088.2094.
Full textB, Akhil, Muzammil Shareef Md, Shalini B, Fairooz SK, and Shaik Mohammed Rafi. "Light weight security coding using PRESENT algorithm for cryptography application." International Journal of VLSI and Signal Processing 7, no. 2 (2020): 1–5. http://dx.doi.org/10.14445/23942584/ijvsp-v7i2p101.
Full textYalamanchili, Anjani, D. Venkatasekhar, and G. Vijay Kumar. "Iot Based Alzheimer’s Disease Diagnosis Model for Providing Security Using Light Weight Hybrid Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 148–59. http://dx.doi.org/10.17762/ijritcc.v11i4.6398.
Full textAlassaf, Norah, and Adnan Gutub. "Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications." International Journal of E-Health and Medical Communications 10, no. 4 (2019): 1–15. http://dx.doi.org/10.4018/ijehmc.2019100101.
Full textMS, Dhruva, Gururaj H L, and Ramesh B. "Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things." International Journal of Engineering and Applied Computer Science 02, no. 05 (2017): 160–64. http://dx.doi.org/10.24032/ijeacs/0205/03.
Full textBaskar, Chanthini, Balasubramaniyan C., and Manivannan D. "Establishment of Light Weight Cryptography for Resource Constraint Environment Using FPGA." Procedia Computer Science 78 (2016): 165–71. http://dx.doi.org/10.1016/j.procs.2016.02.027.
Full textKarrothu, Aravind, and Jasmine Norman. "A systematic analysis of identity based encryption (IBE)." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 3 (2021): 343–56. http://dx.doi.org/10.3233/kes-210078.
Full textArafat, Jahidul, Md Abdul, and Tazkia Binty. "A Light Weight Cryptography (LWC) for Small Scale Data in IoT Devices." International Journal of Computer Applications 182, no. 49 (2019): 29–35. http://dx.doi.org/10.5120/ijca2019918758.
Full textGunasekaran, Elavarasi, and Vanitha Muthuraman. "Light Weight Cryptography Based Encrypted Multiple Secret Share Creation for Biometrics Images." Journal of Computational and Theoretical Nanoscience 17, no. 12 (2020): 5469–76. http://dx.doi.org/10.1166/jctn.2020.9441.
Full textSri Lakshmi, M., and V. Srikanth. "A Study on Light Weight Cryptography Algorithms for Data Security in IOT." International Journal of Engineering & Technology 7, no. 2.7 (2018): 887. http://dx.doi.org/10.14419/ijet.v7i2.7.11088.
Full textDong, Pham-Khoi, Khanh N. Dang, Duy-Anh Nguyen, and Xuan-Tu Tran. "A light-weight neuromorphic controlling clock gating based multi-core cryptography platform." Microprocessors and Microsystems 106 (April 2024): 105040. http://dx.doi.org/10.1016/j.micpro.2024.105040.
Full textKim, Sung-Gon, Hyun-Min Kim, and Seok-Hie Hong. "Research on efficient HW/SW co-design method of light-weight cryptography using GEZEL." Journal of the Korea Institute of Information Security and Cryptology 24, no. 4 (2014): 593–605. http://dx.doi.org/10.13089/jkiisc.2014.24.4.593.
Full textKhan, Muhammad Imran. "Light-weight Security Protocol in IoT with Less Computational Cost." Quaid-e-Awam University Research Journal of Engineering, Science & Technology 20, no. 1 (2022): 21–28. http://dx.doi.org/10.52584/qrj.2001.04.
Full textKodada, Basappa B., and Demian Antony D’Mello. "Symmetric Key Cryptosystem based on Sequential State Machine." IOP Conference Series: Materials Science and Engineering 1187, no. 1 (2021): 012026. http://dx.doi.org/10.1088/1757-899x/1187/1/012026.
Full textSangeetha Supriya Kola, Et al. "Review on Lightweight Cryptography Techniques and Steganography Techniques for IOT Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 3436–44. http://dx.doi.org/10.17762/ijritcc.v11i9.9552.
Full textPark, Won-kyu, Guillermo Pallares Cebrian, Sung-joon Kim, Kang-hyun Lee, Dae-woon Lim, and Ki-soon Yu. "A Study on the Throughput Enhancement in Software Implementation of Ultra Light-Weight Cryptography PRESENT." Journal of Korean Institute of Communications and Information Sciences 42, no. 2 (2017): 316–22. http://dx.doi.org/10.7840/kics.2017.42.2.316.
Full textS. Chithra, Dr, Dr N. Bhalaji, and S. Nandini. "A Lightweight Trust Scheme for Iot." International Journal of Engineering & Technology 7, no. 3.34 (2018): 241. http://dx.doi.org/10.14419/ijet.v7i3.34.18974.
Full textArulkarthick, Dr V. J. "High-performance Block Cipher Using Flexible Architecture." International Academic Journal of Science and Engineering 6, no. 1 (2021): 188–93. http://dx.doi.org/10.9756/iajse/v6i1/1910019.
Full textKhadji, Marwa, Samira Kholji, Salmane Bourekkadi, and Mohamed Larbi kerkeb. "Sustainable MapReduce: Optimizing Security and Efficiency in Hadoop Clusters with Lightweight Cryptography-based Key Management." E3S Web of Conferences 412 (2023): 01065. http://dx.doi.org/10.1051/e3sconf/202341201065.
Full textHakeem, Shimaa A. Abdel, Mohamed A. Abd El-Gawad, and HyungWon Kim. "Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography." Sensors 20, no. 19 (2020): 5719. http://dx.doi.org/10.3390/s20195719.
Full textLiu, Chen, Hoda Aghaei Khouzani, and Chengmo Yang. "ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 132–48. http://dx.doi.org/10.1515/popets-2017-0009.
Full textPadmashree, M. G., J. S. Arunalatha, and K. R. Venugopal. "EBASKET: ECC Blended Authentication and Session Key Establishment Technique for IoT." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 11 (2021): 20–28. https://doi.org/10.35940/ijitee.K9461.09101121.
Full textToy, Noel, and Senthilnathan T. "Light weight authentication protocol for WSN using ECC and hexagonal numbers." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 1 (2019): 443. http://dx.doi.org/10.11591/ijeecs.v15.i1.pp443-450.
Full textJadaun, Abha, Satish Kumar Alaria, and Yashika Saini. "Comparative Study and Design Light Weight Data Security System for Secure Data Transmission in Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 9, no. 3 (2021): 28–32. http://dx.doi.org/10.17762/ijritcc.v9i3.5476.
Full textVijai, Anand Ramar, and Kumar R. Veerandra. "ENHANCING DATA PRIVACY AND SECURITY IN CLOUD HEALTHCARE SOLUTIONS USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC)." International Journal Of Engineering Technology Research & Management (IJETRM) 03, no. 05 (2019): 133–43. https://doi.org/10.5281/zenodo.15600580.
Full textEt. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.
Full textSuryateja, Pericherla Satya, and Dr Kasukurthi Venkata Rao. "Performance Evaluation of Contemporary Block Ciphers for IoT Applications." Journal of Internet Services and Information Security 15, no. 1 (2025): 16–31. https://doi.org/10.58346/jisis.2025.i1.002.
Full textShakya, Subarna. "A Perspective Review of Security Issues in IoT with Cloud Environment." Journal of ISMAC 4, no. 2 (2022): 84–93. http://dx.doi.org/10.36548/jismac.2022.2.002.
Full textYadav, G. Vidhisha, N. Ramanjaneya Reddy, and U. Sesadri. "Performance Analysis of Malicious nodes on Multi hop Cellular Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 7 (2013): 2752–58. http://dx.doi.org/10.24297/ijct.v11i7.3473.
Full textParmar, Martin, and Parth Shah. "Internet of things-blockchain lightweight cryptography to data security and integrity for intelligent application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4422. http://dx.doi.org/10.11591/ijece.v13i4.pp4422-4431.
Full textMartin, Parmar, and Shah Parth. "Internet of things-blockchain lightweight cryptography to data security and integrity for intelligent application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4422–31. https://doi.org/10.11591/ijece.v13i4.pp4422-4431.
Full textJammula, Mounika. "Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algorithm Named Ternary DES for Digital Payments." Asian Journal of Applied Science and Technology 06, no. 01 (2022): 89–98. http://dx.doi.org/10.38177/ajast.2022.6111.
Full textWoud, M. Abed. "A DNA-based Privacy-preserving Scheme in Smart-grid." International Journal on Cryptography and Information Security (IJCIS) 9, no. 3 (2019): 1–10. https://doi.org/10.5281/zenodo.3473019.
Full textMonica Mehrotra, Md Shamsul Haque Ansari,. "Lightweight Cryptography based Communication Model for Device Identification, Mutual Authentication, and Encryption in a Smart City Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 986–94. http://dx.doi.org/10.17762/ijritcc.v11i9.8989.
Full textHakeem, Shimaa A. Abdel, and HyungWon Kim. "Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X." Sensors 21, no. 2 (2021): 665. http://dx.doi.org/10.3390/s21020665.
Full textM.R.Sheeba and G.Suganthi. "An Efficient Authentication Scheme Based on Mutual Verification for IoT Devices in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 11, no. 4 (2022): 1–11. https://doi.org/10.35940/ijitee.C9764.0311422.
Full textAttah, Amankwah. "Mitigating Electromagnetic Side-Channel Attacks." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 71–76. http://dx.doi.org/10.22624/aims/crp-bk3-p12.
Full textChen, Yanan, Zhenyu Lu, Hu Xiong, and Weixiang Xu. "Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/1378583.
Full textBharathi Malakreddy A., Vani G. "An Algorithm to Increase the Attached Complexity and Time Consumption for Iot Healthcare Applications Based on the Truncated Quantum Hashed Method." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 7594–99. http://dx.doi.org/10.52783/tjjpt.v44.i4.2614.
Full textJohn, Jacob. "Performance Analysis of New Light Weight Cryptographic Algorithms." IOSR Journal of Computer Engineering 5, no. 5 (2012): 01–04. http://dx.doi.org/10.9790/0661-0550104.
Full textKarode, Atul H., Shekhar R. Suralkar, and Vaishali B. Patil. "Performance Evaluation of Light Weight Cryptographic CLEFIA Algorithm." International Journal of Electronics and Communication Engineering 10, no. 8 (2023): 48–58. http://dx.doi.org/10.14445/23488549/ijece-v10i8p105.
Full textChangalvala, Raghu, Brandon Fedoruk, and Hafiz Malik. "Radar Data Integrity Verification Using 2D QIM-Based Data Hiding." Sensors 20, no. 19 (2020): 5530. http://dx.doi.org/10.3390/s20195530.
Full textP, Latha, and Andhe Pallavi. "Light Weight Cryptographic Algorithms- A Comparison for IoT Sensor Data." JNNCE Journal of Engineering and Management 6, no. 1 (2022): 117–20. http://dx.doi.org/10.37314/jjem.2022.060117.
Full textMaria, Rina, and V. Anitha. "Light Weight Asymmetric Cryptographic Algorithm for Financial Transactions through Mobile Application." International Journal of Computer Applications 170, no. 3 (2017): 37–41. http://dx.doi.org/10.5120/ijca2017914763.
Full textAlassaf, Norah, Adnan Gutub, Shabir A. Parah, and Manal Al Ghamdi. "Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications." Multimedia Tools and Applications 78, no. 23 (2018): 32633–57. http://dx.doi.org/10.1007/s11042-018-6801-z.
Full text