Academic literature on the topic 'Salsa20 lightweight algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Salsa20 lightweight algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Salsa20 lightweight algorithm"

1

Muhalhal, Lamia A., and Imad S. Alshawi. "A hybrid modified lightweight algorithm for achieving data integrity and confidentiality." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 833. http://dx.doi.org/10.11591/ijece.v13i1.pp833-841.

Full text
Abstract:
<span lang="EN-US">Encryption algorithms aim to make data secure enough to be decrypted by an attacker. This paper combines the Speck and the Salsa20 to make it difficult for an attacker to exploit any weaknesses in these two algorithms and create a new lightweight hybrid algorithm called Speck-Salsa20 algorithm for data integrity and confidentiality (SSDIC). SSDIC uses less energy and has an efficient throughput. It works well in both hardware and software and can handle a variety of explicit plaintext and key sizes. SSDIC solves the difficulties of the Speck algorithm. The sequence gen
APA, Harvard, Vancouver, ISO, and other styles
2

Lamia, A. Muhalha, and S. Alshawi Imad. "A hybrid modified lightweight algorithm for achieving data integrity and confidentiality." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 1 (2023): 833–41. https://doi.org/10.11591/ijece.v13i1.pp833-841.

Full text
Abstract:
Encryption algorithms aim to make data secure enough to be decrypted by an attacker. This paper combines the Speck and the Salsa20 to make it difficult for an attacker to exploit any weaknesses in these two algorithms and create a new lightweight hybrid algorithm called Speck-Salsa20 algorithm for data integrity and confidentiality (SSDIC). SSDIC uses less energy and has an efficient throughput. It works well in both hardware and software and can handle a variety of explicit plaintext and key sizes. SSDIC solves the difficulties of the Speck algorithm. The sequence generated by Speck is not ra
APA, Harvard, Vancouver, ISO, and other styles
3

Jomaa, Ibtesam, Worud Mahdi Saleh, Rasha Rokan Ismail, and Saja Huzber Hussien. "Secured Drone Communication Based on Esalsa20 Algorithm." International Journal of Circuits, Systems and Signal Processing 17 (March 6, 2023): 67–75. http://dx.doi.org/10.46300/9106.2023.17.8.

Full text
Abstract:
The Unmanned Aerial Vehicle (UAV) (sometimes known as a ""drone"") is used in a variety of fields. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps is required. By using a proposed key generation method which is based on a 1d Logistic chaotic map to produce a flight session key for a drone with a flight plan, and then records the flight session
APA, Harvard, Vancouver, ISO, and other styles
4

S., M. Salim Reza, Murshedul Arifeen Md, Kiong Tiong Sieh, et al. "Salsa20 based lightweight security scheme for smart meter communication in smart grid." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 228–33. https://doi.org/10.12928/TELKOMNIKA.v18i1.14798.

Full text
Abstract:
The traditional power gird is altering dramatically to a smart power grid with the escalating development of information and communication technology (ICT). Among thousands of electronic devices connected to the grid through communication network, smart meter (SM) is the core networking device. The consolidation of ICT to the electronic devices centered on SM open loophole for the adversaries to launch cyber-attack. Therefore, for protecting the network from the adversaries it is required to design lightweight security mechanism for SM, as conventional cryptography schemes poses extensive comp
APA, Harvard, Vancouver, ISO, and other styles
5

Ibtesam, Jomaa, Mahdi Saleh Worud, Rokan Ismail Hassan Rasha, and Huzber Hussien Wadi Saja. "Secured drone communication based on Esalsa20 algorithm and 1D logistic map." Secured drone communication based on Esalsa20 algorithm and 1D logistic map 29, no. 2 (2023): 861–74. https://doi.org/10.11591/ijeecs.v29.i2.pp861-874.

Full text
Abstract:
Over recent years, drones are increasingly being used not only for military tasks only, but also for civilian tasks too, such as environment and traffic monitoring, delivery services, and aerial surveys. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps to cipher payload data to improve security network transfer of radio technical commission for
APA, Harvard, Vancouver, ISO, and other styles
6

Ravi, Kanth Motupalli, and Prasad K. Krishna. "Distributed Authentication Using Blockchain for Protected Communication in Cloud Based IoT Platform." International Journal of Management, Technology, and Social Sciences (IJMTS) 7, no. 2 (2022): 669–78. https://doi.org/10.5281/zenodo.7464623.

Full text
Abstract:
<strong>Purpose: </strong><em>The technology has improvised to control the devices from the remote location using the IoT framework. To improvise the storage efficiency of the technology the IoT is integrated with the cloud network. When the huge size of the data is generated this cloud server hosts the space for the big data. But the secure exchange of the data between the IoT data is not efficient to protect the confidentiality of the data.&nbsp; The existing security systems are either concentrating on the authentication or secure validation. Hence there is a demand for the lightweight, les
APA, Harvard, Vancouver, ISO, and other styles
7

Jomaa, Ibtesam, Worud Mahdi Saleh, Rasha Rokan Ismail Hassan, and Saja Huzber Hussien Wadi. "Secured drone communication based on Esalsa20 algorithm and 1d logistic map." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 2 (2023): 861. http://dx.doi.org/10.11591/ijeecs.v29.i2.pp861-874.

Full text
Abstract:
&lt;span lang="EN-US"&gt;Over recent years, drones are increasingly being used not only for military tasks only, but also for civilian tasks too, such as environment and traffic monitoring, delivery services, and aerial surveys. Unfortunately, as they become more popular and in demand, they become more vulnerable to a variety of security threats. To combat such attacks and security threats, a proper design of a robust security and authentication system based on and stream cipher lightweight salsa20 algorithm with chaotic maps to cipher payload data to improve security network transfer of radio
APA, Harvard, Vancouver, ISO, and other styles
8

Alcaraz-Velasco, Francisco, José M. Palomares, Fernando León-García, and Joaquín Olivares. "Secure Data Transmission Using GS3 in an Armed Surveillance System." Information 16, no. 7 (2025): 527. https://doi.org/10.3390/info16070527.

Full text
Abstract:
Nowadays, the evolution and growth of machine learning (ML) algorithms and the Internet of Things (IoT) are enabling new applications. Smart weapons and people detection systems are examples. Firstly, this work takes advantage of an efficient, scalable, and distributed system, named SmartFog, which identifies people with weapons by leveraging edge, fog, and cloud computing paradigms. Nevertheless, security vulnerabilities during data transmission are not addressed. Thus, this work bridges this gap by proposing a secure data transmission system integrating a lightweight security scheme named GS
APA, Harvard, Vancouver, ISO, and other styles
9

Naif, Jolan Rokan, Israa S. Ahmed, Nashwan Alani, and Haider K. Hoomod. "EAMSA 512: New 512 Bits Encryption Al-gorithm Based on Modified SALSA20." Iraqi Journal for Computer Science and Mathematics, April 16, 2023, 131–42. http://dx.doi.org/10.52866/ijcsm.2023.02.02.011.

Full text
Abstract:
This paper presents the 512-bit encryption algorithm based on modified SALSA20 using an 11-dimensional chaotic system used for generating the keys for the proposed encryption algorithm. Chaotic keys are derived from a combination of two systems, one with six dimensions and the other with five. These keys are used in different operations like shifting, Xoring, and encryption steps in the new proposed algorithm. The proposed algorithm consists of a combination of two parallel parts: Salsa20 and S boxes with chaos keys. The proposed system takes 512 bits of the plaintext, which will be split into
APA, Harvard, Vancouver, ISO, and other styles
10

Motupalli, Ravi Kanth, and Krishna Prasad K. "Distributed Authentication Using Blockchain for Protected Communication in Cloud Based IoT Platform." International Journal of Management, Technology, and Social Sciences, December 22, 2022, 669–78. http://dx.doi.org/10.47992/ijmts.2581.6012.0244.

Full text
Abstract:
Purpose: The technology has improvised to control the devices from the remote location using the IoT framework. To improvise the storage efficiency of the technology the IoT is integrated with the cloud network. When the huge size of the data is generated this cloud server hosts the space for the big data. But the secure exchange of the data between the IoT data is not efficient to protect the confidentiality of the data. The existing security systems are either concentrating on the authentication or secure validation. Hence there is a demand for the lightweight, less complex, and strong secur
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Salsa20 lightweight algorithm"

1

Dweik, Haneen, and Mohammad Abutaha. "A Survey of Lightweight Image Encryption for IoT." In Lightweight Cryptographic Techniques and Cybersecurity Approaches [Working Title]. IntechOpen, 2022. http://dx.doi.org/10.5772/intechopen.104431.

Full text
Abstract:
IoT networks serve as a way for various devices interconnected over the internet to exchange data with each other and with other services. Most smartphones, laptops, and other communication devices are connected to the cloud today, making data accessible to everyone. There are many applications for IoT, from smart IoT applications to industrial products. Encryption is one of the best ways to make IoT networks secure since so much data is being transferred. A lightweight block cipher is one of the most sophisticated means for overcoming the security problems inherent to IoT networks. Because of
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Salsa20 lightweight algorithm"

1

Hussein, Khalid A., and Mohammed D. Taha. "A new hybrid lightweight algorithm (RC6-Salsa20) to image encryption." In 6TH INTERNATIONAL CONFERENCE FOR PHYSICS AND ADVANCE COMPUTATION SCIENCES: ICPAS2024. AIP Publishing, 2025. https://doi.org/10.1063/5.0266194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jawad Kubba, Zaid M., and Haider K. Hoomod. "A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System." In 2019 First International Conference of Computer and Applied Sciences (CAS). IEEE, 2019. http://dx.doi.org/10.1109/cas47993.2019.9075488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!