Suchergebnisse - "Tiny Encryption algorithm"

  • Treffer 1 - 20 von 20
Treffer weiter einschränken
  1. 1

    A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices von Rajesh, Sreeja, Paul, Varghese, Menon, Varun G., Khosravi, Mohammad R.

    ISSN: 2073-8994, 2073-8994
    Veröffentlicht: Basel MDPI AG 01.02.2019
    Veröffentlicht in Symmetry (Basel) (01.02.2019)
    “… Recent advancements in wireless technology have created an exponential rise in the number of connected devices leading to the internet of things (IoT) …”
    Volltext
    Journal Article
  2. 2

    CTEA: Chaos based tiny encryption algorithm using ECDH and TinkerBell map for data security in supply chain management von Kumbhakar, Dulal, Adhikari, Subhajit, Karforma, Sunil

    ISSN: 1573-7721, 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.04.2025
    Veröffentlicht in Multimedia tools and applications (01.04.2025)
    “… Supply chain management (SCM), an essential part of E-Commerce, is required to plan, control, and procurement raw materials, manufacturing, and distribution of …”
    Volltext
    Journal Article
  3. 3

    ENCRYPTION THREE-DIMENSION IMAGE USING TINY ALGORITHM von Abdul Ameer, Noor Hayder, Hussain, Zahraa Faiz, Mohammed, May Sabri

    ISSN: 2313-190X, 2520-4912
    Veröffentlicht: University of Information Technology and Communications 01.12.2020
    “… The development of systems allows providing the capability of using three-dimension (3D) pictures over the internet especially in social media. In previous …”
    Volltext
    Journal Article
  4. 4

    A Dynamic Step-wise Tiny Encryption Algorithm with Fruit Fly Optimization for Quality of Service improvement in healthcare von Sutradhar, Shrabani, Karforma, Sunil, Bose, Rajesh, Roy, Sandip

    ISSN: 2772-4425, 2772-4425
    Veröffentlicht: Elsevier Inc 01.11.2023
    Veröffentlicht in Healthcare analytics (New York, N.Y.) (01.11.2023)
    “… Healthcare highly depends on accessing, processing, analyzing, sharing, and storing electronic data. Cloud computing has evolved in various healthcare fields, …”
    Volltext
    Journal Article
  5. 5

    Revolutionizing XTEA: Unveiling PREXTEA and TRIXTEA-Enhanced Efficiency and Security in Internet of Things von Chaturvedi, Srishti P., Mukherjee, Rahul, Kumar, Santosh, Yadav, Ajay

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 15.02.2025
    Veröffentlicht in IEEE internet of things journal (15.02.2025)
    “… The future of Internet is envisioned as the Internet of Things (IoT), a concept where countless physical objects, many of which possess limited or minimal …”
    Volltext
    Journal Article
  6. 6

    Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities von Shah, Sunil Kumar, Sharma, Raghavendra, Shukla, Neeraj

    ISSN: 2161-3915, 2161-3915
    Veröffentlicht: Chichester, UK John Wiley & Sons, Ltd 01.02.2025
    “… ABSTRACT Traditional networking environments typically configure encryption policies statically on individual devices, but a fast and space‐efficient system …”
    Volltext
    Journal Article
  7. 7

    Bi primitive switching crypto system with key generation mechanism for secure applications von Ruhan Bevi, A., Malarvizhi, S.

    ISSN: 0253-3839, 2158-7299
    Veröffentlicht: Taylor & Francis 19.05.2014
    Veröffentlicht in Journal of the Chinese Institute of Engineers (19.05.2014)
    “… Ensuring security to the information transaction is a major challenge in the communication environment. The choice to guarantee the data transfer using a …”
    Volltext
    Journal Article
  8. 8

    Breaching Security of Full Round Tiny Encryption Algorithm von Sobti, Rajeev, Kaushal, Puneet Kumar

    ISSN: 1930-1650, 1930-1669
    Veröffentlicht: Hershey IGI Global 01.01.2018
    “… Tiny encryption algorithm is a 64-bit block cipher designed by Wheeler and Needham in 1994 and attracted much of its attention due to its capability of …”
    Volltext
    Journal Article
  9. 9

    Design and Implementation of Derivation Cryptographic Algorithms in Embedded Contactless IC Card System von Li, Ping, Fang, Xiang Qun, Ge, Hai Bo

    ISBN: 303785426X, 9783037854266
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Veröffentlicht: Zurich Trans Tech Publications Ltd 01.06.2012
    Veröffentlicht in Applied Mechanics and Materials (01.06.2012)
    “… The paper studied the security measures of contactless IC card system. Derivation cryptographic algorithms were used in the embedded IC card system to generate …”
    Volltext
    Journal Article
  10. 10

    Study on TEA Encryption for Public Communication Network Wireless Remoter von Ge, Yue Tao, Yin, Xiao Tong, Liu, Xiao Ming

    ISBN: 3038351180, 9783038351184
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Veröffentlicht: Zurich Trans Tech Publications Ltd 01.06.2014
    Veröffentlicht in Applied Mechanics and Materials (01.06.2014)
    “… In order to realize wireless remoter not only securely but also quickly data transmission in the public communication network, the Tiny Encryption Algorithm …”
    Volltext
    Journal Article
  11. 11

    An evolutionary computation attack on one-round TEA von Ma, Eddie Yee-Tak, Obimbo, Charlie

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2011
    Veröffentlicht in Procedia computer science (2011)
    “… In this work, one-round Tiny Encryption Algorithm (TEA) is attacked with an Evolutionary Computation method inspired by a combination of Genetic Algorithm (GA) …”
    Volltext
    Journal Article
  12. 12

    Securing IoT Devices with Enhanced Tiny Encryption Algorithm von S, Bhagya, Jain, Kurunandhan, Krishnan, Prabhakar

    Veröffentlicht: IEEE 04.12.2024
    “… The exponential growth of Internet of Things (IoT) devices has brought about significant security challenges, particularly due to their limited computational …”
    Volltext
    Tagungsbericht
  13. 13

    Demitasse: A "Small" Version of the Tiny Encryption Algorithm and Its Use in a Classroom Setting von Holden, Joshua

    ISSN: 0161-1194, 1558-1586
    Veröffentlicht: Philadelphia, PA Taylor & Francis Group 01.01.2013
    Veröffentlicht in Cryptologia (01.01.2013)
    “… This article describes Demitasse, a cipher that is intended to be used by inexperienced students in a classroom setting. The cipher is based on the Tiny …”
    Volltext
    Journal Article
  14. 14

    Tiny Encryption Algorithm on Discrete Cosine Transform Watermarking von Diaztary, Windy, Atmajaya, Dedy, Umar, Fitriyani, Purnawansyah, Harlinda, Abdullah, Syahrul Mubarak

    Veröffentlicht: IEEE 09.04.2021
    “… Watermarking is a method embeds a secret imformation into a host such that can not be detected by the human senses. Hiding the secret information such as legal …”
    Volltext
    Tagungsbericht
  15. 15

    Secured IoT Based Smart Greenhouse System with Image Inspection von Sundari.M, Shunmuga, Mathana, J.M, Nagarajan, T.S

    ISBN: 1728151961, 9781728151960
    ISSN: 2575-7288
    Veröffentlicht: IEEE 01.03.2020
    “… Automated Greenhouse System helps the farmers by controlling the environmental parameters through Internet of Things(IoT), including crop health inspection …”
    Volltext
    Tagungsbericht
  16. 16

    Usability Assessment on Symmetric Cryptography Learning Module von Syamsuddin, Irfan, Bramantoro, Arif

    Veröffentlicht: IEEE 13.10.2020
    “… Teaching information security requires lecturer to introduce several tools to encourage students performing hands on practices in better way in order to …”
    Volltext
    Tagungsbericht
  17. 17

    Avoidance of Replay attack in CAN protocol using Authenticated Encryption von Chandrasekaran, Selvamani, Ramachandran, K.I., Adarsh, S., Puranik, Ashish Kumar

    Veröffentlicht: IEEE 01.07.2020
    “… Controller Area Network is the prominent communication protocol in automotive systems. Its salient features of arbitration, message filtering, error detection, …”
    Volltext
    Tagungsbericht
  18. 18

    Comparison of Implementation Tiny Encryption Algorithm (TEA) and Advanced Encryption Standard (AES) Algorithm on Android Based Open Source Cryptomator Library von Budiyanto, Dani, Putro, Prasetyo Adi Wibowo

    Veröffentlicht: IEEE 01.11.2018
    “… Android based open source cryptomator library is an open source library created by Skymatic and published on the cryptomator.org page. This library uses the …”
    Volltext
    Tagungsbericht
  19. 19

    High throughput implementations of cryptography algorithms on GPU and FPGA von Venugopal, Vivek, Shila, Devu Manikantan

    ISBN: 9781467346214, 1467346217
    ISSN: 1091-5281
    Veröffentlicht: IEEE 01.05.2013
    “… Cryptography algorithms are ranked by their speed in encrypting/decrypting data and their robustness to withstand attacks. Real-time processing of data …”
    Volltext
    Tagungsbericht
  20. 20

    FPGA Based Implementation Scenarios of TEA Block Cipher von Hussain, Muhammad Awais, Badar, Rabiah

    Veröffentlicht: IEEE 01.12.2015
    “… Transmission of sensitive data over some channel is a highly security constrained scenario and thus demands the application of some encryption algorithm. It is …”
    Volltext
    Tagungsbericht