Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2023
A new idea in response to fast correlation attacks on small-state stream ciphers
Microprocessors & Microsystems (MSYS), Volume 96, Issue Chttps://doi.org/10.1016/j.micpro.2022.104720AbstractIn the conference “Fast Software Encryption 2015”, a new line of research was proposed by introducing the first small-state stream cipher (SSC). The goal was to design lightweight stream ciphers for hardware applications by going ...
- research-articleJune 2022
Resource Optimized Selective Image Encryption of Medical Images Using Multiple Chaotic Systems
Microprocessors & Microsystems (MSYS), Volume 91, Issue Chttps://doi.org/10.1016/j.micpro.2022.104546AbstractMedical images typically contain personal and diagnostic information about patients and are typically shared among hospitals, doctors, and patients via public networks. As a result, they must be kept secure while being stored and ...
- research-articleNovember 2021
TRESC: Towards redesigning existing symmetric ciphers
Microprocessors & Microsystems (MSYS), Volume 87, Issue Chttps://doi.org/10.1016/j.micpro.2020.103478AbstractRecently, the security of existing symmetric cryptographic algorithms and protocols has been threatened by new performance challenges and vulnerabilities. In this paper, we propose a dynamic key-dependent approach, ”TRESC”, to make ...
- research-articleFebruary 2020
Power transition X filling based selective Huffman encoding technique for test-data compression and Scan Power Reduction for SOCs
Microprocessors & Microsystems (MSYS), Volume 72, Issue Chttps://doi.org/10.1016/j.micpro.2019.102937AbstractDue to the excessive utilization of memory, data compression is an evergreen research topic. Realizing the constant demand of compression algorithms, this article presents a compression algorithm to analyse the digital VLSI circuits ...
- research-articleFebruary 2020
Lightweight implementation of SILC, CLOC, AES-JAMBU and COLM authenticated ciphers
Microprocessors & Microsystems (MSYS), Volume 72, Issue Chttps://doi.org/10.1016/j.micpro.2019.102925AbstractAuthenticated encryption schemes provide both confidentiality and integrity services, simultaneously. CAESAR competition will identify a portfolio of authenticated ciphers, which is expected to be suitable for widespread adoption and ...
-
- research-articleNovember 2019
M-ABRC (Adaptive Binary Range Coder) using Virtual Sliding Window technique and its VLSI implementation
Microprocessors & Microsystems (MSYS), Volume 71, Issue Chttps://doi.org/10.1016/j.micpro.2019.102901AbstractArithmetic coding is the data compression techniques, which encodes the data by generating the code string that represents a functional value between 0 and 1. In this paper, we propose a modified-Adaptive Binary-RC (Range Coder) or M-...
- research-articleNovember 2019
Guards in action: First-order SCA secure implementations of KETJE without additional randomness
Microprocessors & Microsystems (MSYS), Volume 71, Issue Chttps://doi.org/10.1016/j.micpro.2019.102859AbstractRecently the CAESAR competition has announced several finalists among the submitted authenticated encryption algorithms, after an open selection process during the last five years. Applications using these algorithms are rapidly ...
- research-articleSeptember 2019
VLSI implementation of reversible logic gates cryptography with LFSR key
Microprocessors & Microsystems (MSYS), Volume 69, Issue CPages 68–78https://doi.org/10.1016/j.micpro.2019.05.015AbstractThe reversible computation is an emerging research field, which is used in different applications such as optical computing, digital signal processing, nanotechnologies, bio-information and in low-power computation. In present days, ...
- research-articleJuly 2019
Efficient test vector volume reduction based on equal run length coding technique
Microprocessors & Microsystems (MSYS), Volume 68, Issue CPages 1–10https://doi.org/10.1016/j.micpro.2019.04.001AbstractExcessive test power utilization is one of the major obstacles which the chip industry is facing at present. In SOC plan, test data volume is reduced extensively by using Test data compression strategies. In this paper, a variable-to-...
- research-articleMarch 2019
A novel approach to improve multimedia security utilizing 3D mixed chaotic map
Microprocessors & Microsystems (MSYS), Volume 65, Issue CPages 1–6https://doi.org/10.1016/j.micpro.2018.12.003Highlights- Advance security scheme is proposed via dynamical system (chaotic map).
- The ...
Chaotic maps contribute a vital part in modern cryptography. The algorithms constructed using chaotic maps are considered more effectual and secure. In this work, a novel technique for image encryption utilizing 3D mixed chaotic map is ...
- research-articleAugust 2017
True random number generator based on ring oscillator PUF circuit
Microprocessors & Microsystems (MSYS), Volume 53, Issue CPages 33–41https://doi.org/10.1016/j.micpro.2017.06.021In this paper we propose the method of generating true random numbers utilizing the circuit primarily designed as Physically Unclonable Function (PUF) based on ring oscillators. The goal is to show that it is possible to design the universal crypto ...
- research-articleJuly 2017
RTL implementations and FPGA benchmarking of selected CAESAR Round Two authenticated ciphers
Microprocessors & Microsystems (MSYS), Volume 52, Issue CPages 202–218https://doi.org/10.1016/j.micpro.2017.06.003Authenticated ciphers are cryptographic transformations which combine the functionality of confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) design to describe selected authenticated ciphers using a ...
- research-articleJuly 2017
Cryptanalysis of reduced QTL block cipher
Microprocessors & Microsystems (MSYS), Volume 52, Issue CPages 34–48https://doi.org/10.1016/j.micpro.2017.05.007Recently, a new ultra lightweight block cipher called QTL has been proposed. The authors claim to achieve a fast diffusion in QTL by using a new variant of a generalized Feistel network structure that changes all block messages in one iterative round in ...
- research-articleJuly 2017
Cryptanalytic attacks on cyber-physical systems
Microprocessors & Microsystems (MSYS), Volume 52, Issue CPages 534–539https://doi.org/10.1016/j.micpro.2017.04.017Cryptography finds its application in various objects used in our everyday life. GSM communication, credit cards, tickets for public transport or RFID tags employ cryptographic features either to protect privacy or to ensure trustworthy authentication. ...
- research-articleJuly 2017
Ascon hardware implementations and side-channel evaluation
Microprocessors & Microsystems (MSYS), Volume 52, Issue CPages 470–479https://doi.org/10.1016/j.micpro.2016.10.006Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of CAESAR, the Competition for Authenticated Encryption: Security, Applicability, and Robustness. In this paper, the ...
- research-articleNovember 2016
Efficient FPGA implementation of modular multiplication based on Montgomery algorithm
Microprocessors & Microsystems (MSYS), Volume 47, Issue PAPages 209–215https://doi.org/10.1016/j.micpro.2016.07.008In order to improve the efficiency of modular multiplication algorithm for FPGA implementation on the prime field modular, an efficient scheme is proposed to accomplish 256256 bits modular multiplication algorithm. The embedded IP cores of Xilinx FPGA ...
- research-articleNovember 2016
Dummy operations in scalar multiplication over elliptic curves
Microprocessors & Microsystems (MSYS), Volume 47, Issue PAPages 23–36https://doi.org/10.1016/j.micpro.2016.02.016A large number of embedded systems require a high level of security. Elliptic curve cryptography is well suited for these constrained environments, but some countermeasures must be implemented to prevent leakage of critical data through side-channel ...
- research-articleNovember 2016
Constant-weight coding based software implementation of DPA countermeasure in embedded microcontroller
Microprocessors & Microsystems (MSYS), Volume 47, Issue PAPages 82–89https://doi.org/10.1016/j.micpro.2016.01.002Nowadays, firmware in low-cost microcontrollers (MCUs) must implement cryptographic primitives in order to support practical applications. Effective protections of such implementations against side-channel attacks, especially the differential power ...
- research-articleSeptember 2016
A new zero value attack combined fault sensitivity analysis on masked AES
Microprocessors & Microsystems (MSYS), Volume 45, Issue PBPages 355–362https://doi.org/10.1016/j.micpro.2016.06.014Recently, a new kind of fault-based attacks called fault sensitivity analysis (FSA) has been proposed, which has significant advantage over the traditional Differential Fault Attacks (DFA). However, the masking countermeasure could resist original FSA ...
- research-articleSeptember 2016
Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller
Microprocessors & Microsystems (MSYS), Volume 45, Issue PBPages 297–309https://doi.org/10.1016/j.micpro.2016.06.004Chaotic encryption algorithm is implemented in 32 bit microcontroller to protect text.Security analysis shows the effectiveness of the encryption for real-time applications.Performance and resources analysis justify the implementation of the system.The ...