Academic literature on the topic 'Lightweight hybrid encryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lightweight hybrid encryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Lightweight hybrid encryption"

1

Jabbar Altaay, Alaa A., Jamal N. Hasoon, and Hassan Kassim Albahadily. "Lightweight Image Encryption Based on A Hybrid Approach." JOIV : International Journal on Informatics Visualization 8, no. 2 (2024): 977. http://dx.doi.org/10.62527/joiv.8.2.2757.

Full text
Abstract:
A secure image could be achieved by encryption, a technique for securing images over different media transmission lines with privacy and keeping them safe for the receiver. This paper proposes an image encryption approach to achieve excellent security by combining a lightweight encryption algorithm with the chaotic Peter De Jong map. The Lilliput algorithm, lightweight encryption, uses the Peter De-Jones map to produce keys. The suggested approach achieved a suitable level of complexity that matched the historical demands for transmission images. Two methods were used to conduct the tests on a
APA, Harvard, Vancouver, ISO, and other styles
2

Basim, Suhaila, and Haider K. Hoomod. "Hybrid Lightweight Cryptographic Algorithm for Text Encryption in Web of Things." Mustansiriyah Journal of Pure and Applied Sciences 3, no. 3 (2025): 89–99. https://doi.org/10.47831/mjpas.v3i3.236.

Full text
Abstract:
The increasing significance of securing digital data in diverse applications necessitates the development of advanced cryptographic algorithms. This research proposal advocates for the creation of a robust hybrid cryptographic algorithm explicitly designed for text encryption. We present a new hybrid encryption algorithm can used by users/devices in online computing systems or Web of Things (WoT). The proposed hybrid is based on combination between Speck algorithm with PRESENT algorithms can used as lightweight encryption method. The design that has been proposed for the system deals with data
APA, Harvard, Vancouver, ISO, and other styles
3

Taha, Mohammed, and Khalid Ali Hussein. "Design Sequential Hybrid Lightweight Algorithms For Encryption Data Using RC6 Algorithm." Mustansiriyah Journal of Pure and Applied Sciences 3, no. 1 (2025): 1–11. https://doi.org/10.47831/mjpas.v3i1.75.

Full text
Abstract:
In this study, a novel hybrid encryption scheme is proposed for secure encryption of various types of data such as images, text, documents, and videos. The scheme employs 6D chaos to generate unpredictable and highly secure keys for the RC6 encryption algorithm. The proposed method also constructs eight new S-boxes and eight new P-layers to enhance the security of the encryption process. The S-boxes and P-layers are generated using chaotic initial state parameters and stored in arrays for use in the encryption process. The encryption process uses the RC6 algorithm, S-boxes, and P-layers, with
APA, Harvard, Vancouver, ISO, and other styles
4

Abeer, Tariq Maolood, Khalaf Gbashi Ekhlas, and Shakir Mahmood Eman. "Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 4988–5000. https://doi.org/10.11591/ijece.v12i5.pp4988-5000.

Full text
Abstract:
In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream cipher method is presented an
APA, Harvard, Vancouver, ISO, and other styles
5

Mostafaa, H., S. M. Eisaa, H. H. Issaa, and N. H. Shaker. "Lightweight Hybrid Encryption System with FPGA Design Proposal." IOP Conference Series: Materials Science and Engineering 1051, no. 1 (2021): 012023. http://dx.doi.org/10.1088/1757-899x/1051/1/012023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maolood, Abeer Tariq, Ekhlas Khalaf Gbashi, and Eman Shakir Mahmood. "Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 4988. http://dx.doi.org/10.11591/ijece.v12i5.pp4988-5000.

Full text
Abstract:
<span lang="EN-US">In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower power for computation such as wireless sensors, internet protocol (IP) camera and smart cards. Consequently, to support and preserve the video privacy in video surveillance system, lightweight security methods are required instead of the existing traditional encryption methods. In this paper, a new light weight stream ciph
APA, Harvard, Vancouver, ISO, and other styles
7

Husam, Suha, Haider Kadhim Hoomod, and Khalid Ali Hussein. "Hybrid Algorithm (DES-Present) for encryption image color using 2D-Chaotic System." Mustansiriyah Journal of Pure and Applied Sciences 3, no. 1 (2025): 49–63. https://doi.org/10.47831/mjpas.v3i1.119.

Full text
Abstract:
In recent years, image encryption algorithms have been developed to protect against unauthorized persons and maintain the privacy of recipients. Therefore, it is very important to choose the right algorithm and build it in a way that meets security and performance requirements. The DES algorithm is slow in encryption and decryption operations and vulnerable to attacks. There is a lightweight block cipher for devices with limited resources. May be more vulnerable than differential cryptanalysis. To achieve security, the key of the two algorithms (DES-Present) was generated using a two-dimension
APA, Harvard, Vancouver, ISO, and other styles
8

Rangaree, Pankaj, and Joe Marshell M. "ENHANCED LIGHTWEIGHT CRYPTOGRAPHIC PROTOCOLS FOR SECURE IOT- BASED SENSOR AND AD HOC NETWORKS." ICTACT Journal on Communication Technology 16, no. 1 (2025): 3425–31. https://doi.org/10.21917/ijct.2025.0508.

Full text
Abstract:
The increasing integration of IoT-based sensor and ad hoc networks in diverse applications, such as healthcare, smart cities, and industrial automation, has heightened concerns about data security and privacy. Traditional cryptographic techniques often impose excessive computational overhead, making them unsuitable for resource- constrained IoT environments. Addressing this challenge, a lightweight and secure cryptographic framework is proposed, incorporating multi-factor authentication, efficient key exchange, and hybrid encryption mechanisms. The authentication process begins with a biometri
APA, Harvard, Vancouver, ISO, and other styles
9

Fang, Lei, Xue Rao, Ling Li, and Huan Li. "A RFID-Based Security Authentication System Model for Electric Vehicle Charging Station." Applied Mechanics and Materials 741 (March 2015): 623–28. http://dx.doi.org/10.4028/www.scientific.net/amm.741.623.

Full text
Abstract:
Improving the efficiency of RFID data storage and ensuring communication security is an effective way to improve the efficiency and safety of the identifying and authenticating process between charging stations and electric vehicles. Considering structure of electric vehicle charging station (EVCS) and the components of RFID system, this paper presents a charging station security authentication system model based on lightweight RFID security protocol using hybrid encryption technology. This protocol participates in the computation and storage through a reader-writer, so that it can store more
APA, Harvard, Vancouver, ISO, and other styles
10

Mohammed, Zahraa A., and Khalid Ali Hussein. "PILEA, an Advanced Hybrid Lightweight Algorithm utilizing Logical Mathematical Functions and Chaotic Systems." Engineering, Technology & Applied Science Research 14, no. 5 (2024): 16260–65. http://dx.doi.org/10.48084/etasr.7799.

Full text
Abstract:
In information security, data encryption plays a crucial role in preventing unauthorized access. Traditional methods often fall short when faced with sophisticated cyber threats. This research presents a hybrid encryption technique that integrates a recently devised 5D chaotic system, effectively bolstering data security by encoding information in an intricate, puzzle-like structure. This approach thwarts easy access to sensitive data, thus safeguarding them from potential interception and exploitation. The proposed encryption method combines the Linear Encryption Algorithm (LEA) and the Advan
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Lightweight hybrid encryption"

1

Khanjar, Ibtihal Ali, Haider K. Hoomod, and Intisar Abd Yousif. "Hybrid Encryption Algorithm: AES and PRESENT Lightweight with a Chaotic System (PHEPA-AES)." In Proceedings of Third International Conference on Computing and Communication Networks. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0892-5_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hariprasad, S., T. Deepa, and N. Bharathiraja. "HLWEA-IOT: Hybrid Lightweight Encryption Algorithm Based Secure Data Transmission in IoT-MQTT Networks." In Intelligent Cyber Physical Systems and Internet of Things. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-18497-0_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dweik, Haneen, and Mohammad Abutaha. "A Survey of Lightweight Image Encryption for IoT." In Lightweight Cryptographic Techniques and Cybersecurity Approaches [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.104431.

Full text
Abstract:
IoT networks serve as a way for various devices interconnected over the internet to exchange data with each other and with other services. Most smartphones, laptops, and other communication devices are connected to the cloud today, making data accessible to everyone. There are many applications for IoT, from smart IoT applications to industrial products. Encryption is one of the best ways to make IoT networks secure since so much data is being transferred. A lightweight block cipher is one of the most sophisticated means for overcoming the security problems inherent to IoT networks. Because of
APA, Harvard, Vancouver, ISO, and other styles
4

Hafsa, Amal, Jihene Malek, and Mohsen Machhout. "Hardware Implementation of an Improved Hybrid Cryptosystem for Numerical Image Encryption and Authenticity." In Lightweight Cryptographic Techniques and Cybersecurity Approaches [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.105207.

Full text
Abstract:
Cryptography is the science that concerns protecting information by transforming its comprehensible form into an incomprehensible one. The conception of a robust cryptosystem is a challenge. In this paper, an improved hybrid cryptosystem for numerical image protection is presented. First, the initial secret key is generated by a secure hash function (keccak). Secondly, the plain image is encrypted through the advanced encryption standard (AES) with CTR mode. Finally, a Rivest-Shamir-Adleman (RSA) algorithm is used to secure the symmetric key transmitted over the insecure channel and owner sign
APA, Harvard, Vancouver, ISO, and other styles
5

N., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In Research Anthology on Cross-Industry Challenges of Industry 4.0. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8548-1.ch094.

Full text
Abstract:
The main objectives of this chapter are to discuss the basics of IoT and its applications and to solve data security and privacy issues in Industry 4.0. Industry 4.0 is mainly focus on IoT technology. The IIoT is generating digital data, and that data is stored in cloud server. There are two major issues in this IIoT. The first one is data storage, and the second one is data security. Industry 4.0 is not only involved in the manufacturing industry. It is also in the transportation and automobile industries. Electrical, electronic, mechanical, and computer technology fields are involved in Indu
APA, Harvard, Vancouver, ISO, and other styles
6

N., Jayapandian. "Industry 4.0 Privacy and Security Protocol Issues in Internet of Things." In IoT Architectures, Models, and Platforms for Smart City Applications. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1253-1.ch010.

Full text
Abstract:
The main objectives of this chapter are to discuss the basics of IoT and its applications and to solve data security and privacy issues in Industry 4.0. Industry 4.0 is mainly focus on IoT technology. The IIoT is generating digital data, and that data is stored in cloud server. There are two major issues in this IIoT. The first one is data storage, and the second one is data security. Industry 4.0 is not only involved in the manufacturing industry. It is also in the transportation and automobile industries. Electrical, electronic, mechanical, and computer technology fields are involved in Indu
APA, Harvard, Vancouver, ISO, and other styles
7

Qureshi, Basit. "An Affordable Hybrid Cloud Based Cluster for Secure Health Informatics Research." In Data Analytics in Medicine. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1204-3.ch033.

Full text
Abstract:
This article describes how a major risk factor in the deployment of patient health records systems in the cloud is the security and privacy of data. Hybrid cloud solutions have been proposed that leverage the public and private cloud deployment to manage and alleviate accessibility, access control and privacy concerns. This article presents a privacy preserving and secure architecture for data acquisition, storage, processing and sharing. The proposed architecture is composed of a public cloud-based services that interact with a low-cost cloud computing cluster (LoC4) as a backend. A lightweig
APA, Harvard, Vancouver, ISO, and other styles
8

Zafar, Aasim, and Syed Shamikh Iqbal. "Code-Based Cryptography and Its Place in Quantum-Safe Strategies." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-9220-1.ch004.

Full text
Abstract:
Quantum computation has progressed to the point where it is now a significant threat to traditional cryptographic algorithms such as RSA and ECC. In this chapter, we focus on the topic of code-based cryptography, which represents another important piece in the post-quantum cryptography puzzle. Codes-based cryptography relies on error-correcting codes in order to instantiate encryption schemes provably secure against quantum attacks. We focus mainly on the McEliece and Niederreiter cryptosystems since these systems are known to be secure against quantum algorithms. The reason for that is based
APA, Harvard, Vancouver, ISO, and other styles
9

Mahendran, Anand, Narmadha K., and M. Hamada. "A Study on Various Cryptographic Techniques Towards Fog Environment." In Advances in Edge Computing: Massive Parallel Processing and Applications. IOS Press, 2020. http://dx.doi.org/10.3233/apc200009.

Full text
Abstract:
Fog is a computing environment which extends the resources to the end of the network infrastructure. It reduces the latency and reachability to the user. Fog computing supports heterogeneity, mobility, and wireless access. Fog nodes had distributed over the vast geographical area. These features facilitate fog computing for sensitive real-time applications which concerns about low latency, such as smart city, smart home, healthcare, and other industrial applications. Simultaneously, these features of fog computing create a space for virtualization issues, web security issues, internal/external
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Lightweight hybrid encryption"

1

Sahmi, Imane, EL mehdi Ait fakir, and Abderrahim Abdellaoui. "A Hybrid Lightweight Encryption Using SPECK and SIMON for E-Health Using IoT." In 2024 10th International Conference on Optimization and Applications (ICOA). IEEE, 2024. http://dx.doi.org/10.1109/icoa62581.2024.10753963.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gong, Bo-fan. "Hybrid Compression and Lightweight Encryption of Color Image." In ICMSSP 2020: 2020 5th International Conference on Multimedia Systems and Signal Processing. ACM, 2020. http://dx.doi.org/10.1145/3404716.3404729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chengliang Liang, Ning Ye, Reza Malekian, and Ruchuan Wang. "The hybrid encryption algorithm of lightweight data in cloud storage." In 2016 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR). IEEE, 2016. http://dx.doi.org/10.1109/isamsr.2016.7810021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hussein, Khalid A., and Mohammed D. Taha. "A new hybrid lightweight algorithm (RC6-Salsa20) to image encryption." In 6TH INTERNATIONAL CONFERENCE FOR PHYSICS AND ADVANCE COMPUTATION SCIENCES: ICPAS2024. AIP Publishing, 2025. https://doi.org/10.1063/5.0266194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abbood, Fadhil Hanoon, and Leila Ben Ayed. "Efficient lightweight color image encryption using hybrid stream cipher cryptographic based on parallel processing." In INTERNATIONAL SCIENTIFIC CONFERENCE ON MODERN PROBLEMS OF APPLIED SCIENCE AND ENGINEERING: MPASE2024. AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0241478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Charmi, Atefeh, and Meisam Yadollahzadeh-Tabari. "EGECC-MAES: Lightweight hybrid encryption algorithm in blockchain for smart health care in the Internet of Things platform." In 2024 20th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP). IEEE, 2024. http://dx.doi.org/10.1109/aisp61396.2024.10475277.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!