-
Chapter and Conference Paper
Comparative Performance Analysis of Present Lightweight Cipher for Security Applications in Extremely Constrained Environment
A lightweight cipher architecture is a cryptographic system designed to be efficient in terms of computational complexity, memory usage, and power consumption. It is often used in applications where resources ...
-
Chapter and Conference Paper
Investigation of Normally-Off β-Ga2O3 Power MOSFET Using Ferroelectric Gate
In this paper, we present a normally-off beta-gallium oxide (β-Ga2O3) metal–oxide–semiconductor field-effect transistor (MOSFET) with ferroelectric gate (Fe-G). The enhancement-mode (E-Mode) operations are achiev...
-
Chapter and Conference Paper
Fraudulent IP Address Detection Using Machine Learning Techniques
The popularity of network technology and the threats involved make it imperative to develop various techniques to effectively detect fraudulent activities. The focus of this paper is to discover actionable irr...
-
Chapter and Conference Paper
Area-optimized Serial Architecture of PRINT Cipher for Resource-constrained Devices
The study of lightweight symmetric cipher has gained attention because of the rising interest for security administrations in constrained computing environments, like in the and other resource-constrained de...
-
Chapter and Conference Paper
High Throughput Pipelined Architecture for AES Cipher
There has been a significant rise in internet and wireless device users, raising the need for security to protect consumer data shared over open networks. Field Programmable Gate Arrays (FPGAs) are particularl...
-
Chapter and Conference Paper
Multiplexer-based High-speed S-box Architecture for PRESENT Cipher in FPGA
The Internet of Things (IoT) is the technology that will revolutionize our world. It is a system of interrelated devices linked to the Internet. It comprises large number of resource-constrained devices, machi...
-
Chapter and Conference Paper
A Novel Hardware Architecture for Rectangle Block Cipher
This era of constrained computing devices require proper security in the limited available area. Lightweight cipher RECTANGLE is appropriate for numerous platforms and resource-limited environment. In this cha...
-
Chapter and Conference Paper
An Area-Optimized Architecture for LiCi Cipher
With the rise in ubiquitous computing in resource-constrained devices, there is the huge emphasis being laid on minimal area consumption, power utilization, and optimum cost without compromising on the securit...