Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Comparative Performance Analysis of Present Lightweight Cipher for Security Applications in Extremely Constrained Environment

    A lightweight cipher architecture is a cryptographic system designed to be efficient in terms of computational complexity, memory usage, and power consumption. It is often used in applications where resources ...

    Shipra Upadhyay, Pulkit Singh in Emergent Converging Technologies and Biome… (2024)

  2. No Access

    Chapter and Conference Paper

    Investigation of Normally-Off β-Ga2O3 Power MOSFET Using Ferroelectric Gate

    In this paper, we present a normally-off beta-gallium oxide (β-Ga2O3) metal–oxide–semiconductor field-effect transistor (MOSFET) with ferroelectric gate (Fe-G). The enhancement-mode (E-Mode) operations are achiev...

    Rajan Singh, G. Purnachandra Rao in Micro and Nanoelectronics Devices, Circuit… (2024)

  3. No Access

    Chapter and Conference Paper

    Fraudulent IP Address Detection Using Machine Learning Techniques

    The popularity of network technology and the threats involved make it imperative to develop various techniques to effectively detect fraudulent activities. The focus of this paper is to discover actionable irr...

    Pulkit Singh, Abdul Razak in Information Systems for Intelligent Systems (2024)

  4. No Access

    Chapter and Conference Paper

    Area-optimized Serial Architecture of PRINT Cipher for Resource-constrained Devices

    The study of lightweight symmetric cipher has gained attention because of the rising interest for security administrations in constrained computing environments, like in the and other resource-constrained de...

    Manisha Kumari, Pulkit Singh in Intelligent Control, Robotics, and Industr… (2023)

  5. No Access

    Chapter and Conference Paper

    High Throughput Pipelined Architecture for AES Cipher

    There has been a significant rise in internet and wireless device users, raising the need for security to protect consumer data shared over open networks. Field Programmable Gate Arrays (FPGAs) are particularl...

    Piyush Modi, Pulkit Singh in Proceeding of Fifth International Conferen… (2021)

  6. No Access

    Chapter and Conference Paper

    Multiplexer-based High-speed S-box Architecture for PRESENT Cipher in FPGA

    The Internet of Things (IoT) is the technology that will revolutionize our world. It is a system of interrelated devices linked to the Internet. It comprises large number of resource-constrained devices, machi...

    Piyush Modi, Pulkit Singh in Nanoelectronics, Circuits and Communicatio… (2021)

  7. No Access

    Chapter and Conference Paper

    A Novel Hardware Architecture for Rectangle Block Cipher

    This era of constrained computing devices require proper security in the limited available area. Lightweight cipher RECTANGLE is appropriate for numerous platforms and resource-limited environment. In this cha...

    Nivedita Shrivastava, Pulkit Singh in Nanoelectronics, Circuits and Communicatio… (2020)

  8. No Access

    Chapter and Conference Paper

    An Area-Optimized Architecture for LiCi Cipher

    With the rise in ubiquitous computing in resource-constrained devices, there is the huge emphasis being laid on minimal area consumption, power utilization, and optimum cost without compromising on the securit...

    Nigar Ayesha, Pulkit Singh in Nanoelectronics, Circuits and Communicatio… (2020)